0c0045005, &(0x7f0000000140)=0x5ad) [ 316.703548][T16227] debugfs: File 'dropped' in directory 'loop0' already present! [ 316.725471][T16227] debugfs: File 'msg' in directory 'loop0' already present! [ 316.762701][T16227] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:21 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x0, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 316.947420][T16252] debugfs: File 'dropped' in directory 'loop0' already present! [ 316.955405][T16252] debugfs: File 'msg' in directory 'loop0' already present! [ 316.962966][T16252] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x0, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 317.133383][T16257] debugfs: File 'dropped' in directory 'loop0' already present! [ 317.141200][T16257] debugfs: File 'msg' in directory 'loop0' already present! [ 317.148600][T16257] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:21 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045005, 0x0) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:21 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:21 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c004500a, 0x0) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:21 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) fsetxattr$security_selinux(r0, &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:dpkg_exec_t:s0\x00', 0x21, 0x1) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000000040)) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:21 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) [ 317.384366][T16272] debugfs: File 'dropped' in directory 'loop0' already present! [ 317.392510][T16272] debugfs: File 'msg' in directory 'loop0' already present! [ 317.400422][T16272] debugfs: File 'trace0' in directory 'loop0' already present! [ 317.450569][ T27] audit: type=1400 audit(1566142401.616:57): avc: denied { associate } for pid=16277 comm="syz-executor.2" name="dsp1" dev="devtmpfs" ino=18660 scontext=system_u:object_r:dpkg_exec_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=filesystem permissive=1 15:33:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 317.570800][T16288] debugfs: File 'dropped' in directory 'loop0' already present! [ 317.578550][T16288] debugfs: File 'msg' in directory 'loop0' already present! [ 317.587668][T16288] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 317.777650][T16292] debugfs: File 'dropped' in directory 'loop0' already present! [ 317.785478][T16292] debugfs: File 'msg' in directory 'loop0' already present! [ 317.792883][T16292] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:22 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045005, 0x0) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:22 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000100)) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:22 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:22 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) 15:33:22 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0xf0042) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000180)={0x4, 0x1, 0x4, {0xb, @raw_data="e7c79f7ecf5313dc445c0b1a64bcd7259c3392f8eb27c82aa0d2fad4c0fab68ed830579f515d63be389bef3d59d67c6bcb9da4e2f267776e2bdbaffa117cbd169076c25bb6195cb29154f40ff6646bdafb3636df5e157e2642276ffea438cd4d716ca41b2923b9865fe429d9fff805d3863c26f6469e1740e0eba1195c6179698a518c78965e99bcb6a1a71a1b912325971c3dc14ce5a10d16fb456704fcce39c69d57473c79f302b5048d1b1fd526fc7c38624590a0c9509e51ab2f276354f6bc046f714fc236dd"}}) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x2, 0x200, 0x92, 0xfffffffffffffff9, 0x0}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000002c0)={r1, 0x7}, &(0x7f0000000300)=0x8) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) [ 318.011133][T16306] debugfs: File 'dropped' in directory 'loop0' already present! [ 318.018887][T16306] debugfs: File 'msg' in directory 'loop0' already present! [ 318.027088][T16306] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:22 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x28000, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0xb) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x1579, 0x4, 0x5, 0x1, 0xfffffffffffff1b8}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={r1, 0x24c8, 0x2fce}, &(0x7f0000000240)=0x8) 15:33:22 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) rt_sigreturn() ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f00000000c0)={&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000180)=""/125, 0x7d}) 15:33:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:22 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0xa2000) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) getsockname$tipc(r0, &(0x7f0000000080)=@id, &(0x7f00000000c0)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) ioctl$SIOCRSGL2CALL(r0, 0x89e5, &(0x7f0000000040)) [ 318.215351][T16329] debugfs: File 'dropped' in directory 'loop0' already present! [ 318.223269][T16329] debugfs: File 'msg' in directory 'loop0' already present! [ 318.230793][T16329] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:22 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:22 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045005, 0x0) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) [ 318.396656][T16343] debugfs: File 'dropped' in directory 'loop0' already present! [ 318.404535][T16343] debugfs: File 'msg' in directory 'loop0' already present! [ 318.412490][T16343] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:22 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:22 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) 15:33:22 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) [ 318.641738][T16353] debugfs: File 'dropped' in directory 'loop0' already present! [ 318.649417][T16353] debugfs: File 'msg' in directory 'loop0' already present! [ 318.682214][T16353] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 318.866768][T16370] debugfs: File 'dropped' in directory 'loop0' already present! [ 318.876572][T16370] debugfs: File 'msg' in directory 'loop0' already present! [ 318.884901][T16370] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:23 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x202001, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000340)={0x4, 0x7, 0x0, 0x4, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}]}) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r1, &(0x7f0000000000), 0x3) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r1, 0x800060c0045005, &(0x7f0000000140)=0x5ad) accept4$vsock_stream(r0, &(0x7f00000003c0)={0x28, 0x0, 0x2710, @hyper}, 0x10, 0x80800) read$rfkill(r1, &(0x7f0000000040), 0x8) 15:33:23 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000100)) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 319.065433][T16382] debugfs: File 'dropped' in directory 'loop0' already present! [ 319.074969][T16382] debugfs: File 'msg' in directory 'loop0' already present! [ 319.082765][T16382] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:23 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) 15:33:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001c00000000000000000000000000000100008000000000000000000000000000000000000000000000000000ea6e00000023000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000006c29c2109fa0385238983d678000000000456126d6d2411ff61c56cfc45067173e8292629dc33874a024525c3eb99d28e1dcf2d9cf2c28a9b3c390fdd50942f93618138012670b0de7d7a2f9f05a64998c058a99b58bf36934944207000000731addeeccaf0407715871fac0a8f7e82b3e6ac4f243f03ea7db1109cc1b6a0a262c7570ab6cf50c0f41bf147c97b61f312fd97605102e5fb6d3c16599aeada399ffa34bc49fff5d0718c28f3f4085bea5efebabebb27628694408e96608b4ed28c1d84594ba77b94254f18b7e000000000000537f75b86b79a7b0b43d01d9ca56d4fe3587c8172030e650c35e23ce8dae57fc9f6065f753584b022671d3e17bbf78c31bfea1d60bc2fce82864970a1aa7ecf29e63ebf7b9a4581b9550e7fd7926f4d258348cec506747c70b516aea34ce2eeb491861e4cfcf752d36828b1e58155e869a3d289bbfcbf8273164d9da820d0c1369313319d5780c8d04bfe688c51140645e69326e0354b8c5155d10e626a4c967fb18e41217c05dbd0b34bf7a49865a35b5595c9347fd8d6310c957d7df1646351ec9397ba73e73fbc3585ddb43a0c018279465d34756bea674e4be0a8b6ee2eed3e52e7778f0fd0ba5a48334b370e499e241e7ab2ddbeb8ffa7657728133e91e46950634f50547ba07e727f2eddb03b86c9d5211c80524e08a3abf35af3e90a45075843e48c17f8479e085067f882ec7b143097d80c57183b840a8f8dc9a01dee0e29f93927ba29270a74aa6fcecd344ccf40c9093e20fda2756"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:23 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:23 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:23 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) [ 319.289364][T16392] debugfs: File 'dropped' in directory 'loop0' already present! [ 319.314696][T16392] debugfs: File 'msg' in directory 'loop0' already present! [ 319.329640][T16392] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:23 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:23 executing program 1: read$rfkill(0xffffffffffffffff, &(0x7f0000000000), 0x3) ioctl$int_in(0xffffffffffffffff, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(0xffffffffffffffff, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:23 executing program 1: read$rfkill(0xffffffffffffffff, &(0x7f0000000000), 0x3) ioctl$int_in(0xffffffffffffffff, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(0xffffffffffffffff, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 319.511850][T16418] debugfs: File 'dropped' in directory 'loop0' already present! [ 319.520654][T16418] debugfs: File 'msg' in directory 'loop0' already present! [ 319.534201][T16418] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:23 executing program 2: socket$bt_cmtp(0x1f, 0x3, 0x5) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000240)=0x24505846, &(0x7f0000000280)=0x2) mknodat(r1, &(0x7f00000000c0)='./file0\x00', 0xc000, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000180)={0x40, {{0x2, 0x4e20, @local}}}, 0x88) 15:33:23 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000100)) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:23 executing program 1: read$rfkill(0xffffffffffffffff, &(0x7f0000000000), 0x3) ioctl$int_in(0xffffffffffffffff, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(0xffffffffffffffff, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:23 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) 15:33:23 executing program 1: r0 = syz_open_dev$dspn(0x0, 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 319.768688][T16437] debugfs: File 'dropped' in directory 'loop0' already present! [ 319.787752][T16437] debugfs: File 'msg' in directory 'loop0' already present! [ 319.797952][T16437] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:24 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000100)) ioctl$int_in(0xffffffffffffffff, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:24 executing program 1: r0 = syz_open_dev$dspn(0x0, 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:24 executing program 1: r0 = syz_open_dev$dspn(0x0, 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:24 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:24 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) [ 319.981967][T16456] debugfs: File 'dropped' in directory 'loop0' already present! [ 319.991181][T16456] debugfs: File 'msg' in directory 'loop0' already present! [ 319.999408][T16456] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:24 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:24 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001c00000000000000000000000000000100008000000000000000000000000000000000000000000000000000ea6e00000023000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000006c29c2109fa0385238983d678000000000456126d6d2411ff61c56cfc45067173e8292629dc33874a024525c3eb99d28e1dcf2d9cf2c28a9b3c390fdd50942f93618138012670b0de7d7a2f9f05a64998c058a99b58bf36934944207000000731addeeccaf0407715871fac0a8f7e82b3e6ac4f243f03ea7db1109cc1b6a0a262c7570ab6cf50c0f41bf147c97b61f312fd97605102e5fb6d3c16599aeada399ffa34bc49fff5d0718c28f3f4085bea5efebabebb27628694408e96608b4ed28c1d84594ba77b94254f18b7e000000000000537f75b86b79a7b0b43d01d9ca56d4fe3587c8172030e650c35e23ce8dae57fc9f6065f753584b022671d3e17bbf78c31bfea1d60bc2fce82864970a1aa7ecf29e63ebf7b9a4581b9550e7fd7926f4d258348cec506747c70b516aea34ce2eeb491861e4cfcf752d36828b1e58155e869a3d289bbfcbf8273164d9da820d0c1369313319d5780c8d04bfe688c51140645e69326e0354b8c5155d10e626a4c967fb18e41217c05dbd0b34bf7a49865a35b5595c9347fd8d6310c957d7df1646351ec9397ba73e73fbc3585ddb43a0c018279465d34756bea674e4be0a8b6ee2eed3e52e7778f0fd0ba5a48334b370e499e241e7ab2ddbeb8ffa7657728133e91e46950634f50547ba07e727f2eddb03b86c9d5211c80524e08a3abf35af3e90a45075843e48c17f8479e085067f882ec7b143097d80c57183b840a8f8dc9a01dee0e29f93927ba29270a74aa6fcecd344ccf40c9093e20fda2756"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:24 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000100)) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:24 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:24 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(0xffffffffffffffff, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) [ 320.292775][T16472] debugfs: File 'dropped' in directory 'loop0' already present! [ 320.315386][T16472] debugfs: File 'msg' in directory 'loop0' already present! [ 320.325520][T16472] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:24 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000100)) ioctl$int_in(r0, 0x0, &(0x7f0000000140)=0x5ad) 15:33:24 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(0xffffffffffffffff, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:24 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:24 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(0xffffffffffffffff, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:24 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) [ 320.557704][T16501] debugfs: File 'dropped' in directory 'loop0' already present! [ 320.589832][T16501] debugfs: File 'msg' in directory 'loop0' already present! [ 320.610677][T16501] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:25 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x80000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000580)={0x4, &(0x7f0000000540)=[{}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f00000005c0)={r1, 0x10}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r2, &(0x7f0000000440), 0x8) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000100)=0x3) write(r2, &(0x7f0000000480)="54d4462073155fac5e15cc0a78dbff7cf03a0c8149a736aa4e0f45627677df3f93b490983b5c963ca982b673b815124177e2818683bc994f046e410a34a7031b55ab4e9cd86fcb30a855d4d0315904fa676fcab313debc9cc6ec5347694418fa1151528f1342f35613d625845b7a1fcf0374e10a3ec9c3eafd1cd8a46892efa726a5b7fa2e9452b15fd6e2ab007b274b4fb216bb40d37f3e39c32b711287670ddeefe78ca90f", 0xa6) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000400)={0x3, &(0x7f0000000240)=[{}, {}, {}]}) accept4$ax25(r2, &(0x7f0000000180)={{0x3, @netrom}, [@rose, @bcast, @rose, @null, @default, @netrom, @remote, @netrom]}, &(0x7f0000000200)=0x48, 0x800) accept4$tipc(r2, &(0x7f00000000c0), &(0x7f0000000140)=0x250, 0x800) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0x39) 15:33:25 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:25 executing program 0: read$rfkill(0xffffffffffffffff, &(0x7f0000000000), 0x3) ioctl$int_in(0xffffffffffffffff, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(0xffffffffffffffff, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:25 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000100)=0x3) ioctl$int_in(0xffffffffffffffff, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:25 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) [ 320.994108][T16522] debugfs: File 'dropped' in directory 'loop0' already present! [ 321.017135][T16522] debugfs: File 'msg' in directory 'loop0' already present! [ 321.039270][T16522] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:25 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000100)) ioctl$int_in(r0, 0x0, &(0x7f0000000140)=0x5ad) 15:33:25 executing program 0: read$rfkill(0xffffffffffffffff, &(0x7f0000000000), 0x3) ioctl$int_in(0xffffffffffffffff, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(0xffffffffffffffff, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:25 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:25 executing program 0: read$rfkill(0xffffffffffffffff, &(0x7f0000000000), 0x3) ioctl$int_in(0xffffffffffffffff, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(0xffffffffffffffff, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:25 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(0xffffffffffffffff, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001c00000000000000000000000000000100008000000000000000000000000000000000000000000000000000ea6e00000023000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000006c29c2109fa0385238983d678000000000456126d6d2411ff61c56cfc45067173e8292629dc33874a024525c3eb99d28e1dcf2d9cf2c28a9b3c390fdd50942f93618138012670b0de7d7a2f9f05a64998c058a99b58bf36934944207000000731addeeccaf0407715871fac0a8f7e82b3e6ac4f243f03ea7db1109cc1b6a0a262c7570ab6cf50c0f41bf147c97b61f312fd97605102e5fb6d3c16599aeada399ffa34bc49fff5d0718c28f3f4085bea5efebabebb27628694408e96608b4ed28c1d84594ba77b94254f18b7e000000000000537f75b86b79a7b0b43d01d9ca56d4fe3587c8172030e650c35e23ce8dae57fc9f6065f753584b022671d3e17bbf78c31bfea1d60bc2fce82864970a1aa7ecf29e63ebf7b9a4581b9550e7fd7926f4d258348cec506747c70b516aea34ce2eeb491861e4cfcf752d36828b1e58155e869a3d289bbfcbf8273164d9da820d0c1369313319d5780c8d04bfe688c51140645e69326e0354b8c5155d10e626a4c967fb18e41217c05dbd0b34bf7a49865a35b5595c9347fd8d6310c957d7df1646351ec9397ba73e73fbc3585ddb43a0c018279465d34756bea674e4be0a8b6ee2eed3e52e7778f0fd0ba5a48334b370e499e241e7ab2ddbeb8ffa7657728133e91e46950634f50547ba07e727f2eddb03b86c9d5211c80524e08a3abf35af3e90a45075843e48c17f8479e085067f882ec7b143097d80c57183b840a8f8dc9a01dee0e29f93927ba29270a74aa6fcecd344ccf40c9093e20fda2756"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 321.250709][T16554] debugfs: File 'dropped' in directory 'loop0' already present! [ 321.264371][T16554] debugfs: File 'msg' in directory 'loop0' already present! [ 321.272272][T16554] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:25 executing program 2: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xb2cd, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x40000) read$rfkill(r0, &(0x7f0000000040), 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@initdev}}, &(0x7f0000000600)=0xe8) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000640)={@remote, @empty, @loopback, 0x0, 0x2, 0x401, 0x100, 0x1, 0x0, r2}) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000080)=0xa1) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:25 executing program 0: r0 = syz_open_dev$dspn(0x0, 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:25 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000100)=0x3) ioctl$int_in(0xffffffffffffffff, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:25 executing program 0: r0 = syz_open_dev$dspn(0x0, 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:25 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x180, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0xfe, 0x7b, &(0x7f0000000280)="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", &(0x7f0000000380)=""/123, 0xffffffffffffffff}, 0x28) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r1, &(0x7f0000000000), 0x3) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000100)=0x3) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000180)=""/246, &(0x7f0000000040)=0xf6) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440)=[@mss={0x2, 0x7f}, @timestamp, @mss={0x2, 0x6}, @sack_perm, @window={0x3, 0x8001, 0x4d119811}], 0x5) ioctl$int_in(r1, 0x800060c0045005, &(0x7f0000000140)=0x5ad) [ 321.623250][T16566] debugfs: File 'dropped' in directory 'loop0' already present! [ 321.643809][T16566] debugfs: File 'msg' in directory 'loop0' already present! [ 321.659992][T16566] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:25 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000100)) ioctl$int_in(r0, 0x0, &(0x7f0000000140)=0x5ad) 15:33:25 executing program 0: r0 = syz_open_dev$dspn(0x0, 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:25 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(0xffffffffffffffff, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:25 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:26 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:26 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) [ 321.895176][T16598] debugfs: File 'dropped' in directory 'loop0' already present! [ 321.903332][T16598] debugfs: File 'msg' in directory 'loop0' already present! [ 321.919622][T16598] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:26 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(0xffffffffffffffff, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:26 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(0xffffffffffffffff, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:26 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000100)=0x3) ioctl$int_in(0xffffffffffffffff, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001c00000000000000000000000000000100008000000000000000000000000000000000000000000000000000ea6e00000023000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000006c29c2109fa0385238983d678000000000456126d6d2411ff61c56cfc45067173e8292629dc33874a024525c3eb99d28e1dcf2d9cf2c28a9b3c390fdd50942f93618138012670b0de7d7a2f9f05a64998c058a99b58bf36934944207000000731addeeccaf0407715871fac0a8f7e82b3e6ac4f243f03ea7db1109cc1b6a0a262c7570ab6cf50c0f41bf147c97b61f312fd97605102e5fb6d3c16599aeada399ffa34bc49fff5d0718c28f3f4085bea5efebabebb27628694408e96608b4ed28c1d84594ba77b94254f18b7e000000000000537f75b86b79a7b0b43d01d9ca56d4fe3587c8172030e650c35e23ce8dae57fc9f6065f753584b022671d3e17bbf78c31bfea1d60bc2fce82864970a1aa7ecf29e63ebf7b9a4581b9550e7fd7926f4d258348cec506747c70b516aea34ce2eeb491861e4cfcf752d36828b1e58155e869a3d289bbfcbf8273164d9da820d0c1369313319d5780c8d04bfe688c51140645e69326e0354b8c5155d10e626a4c967fb18e41217c05dbd0b34bf7a49865a35b5595c9347fd8d6310c957d7df1646351ec9397ba73e73fbc3585ddb43a0c018279465d34756bea674e4be0a8b6ee2eed3e52e7778f0fd0ba5a48334b370e499e241e7ab2ddbeb8ffa7657728133e91e46950634f50547ba07e727f2eddb03b86c9d5211c80524e08a3abf35af3e90a45075843e48c17f8479e085067f882ec7b143097d80c57183b840a8f8dc9a01dee0e29f93927ba29270a74aa6fcecd344ccf40c9093e20fda2756"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 322.222329][T16618] debugfs: File 'dropped' in directory 'loop0' already present! [ 322.230284][T16618] debugfs: File 'msg' in directory 'loop0' already present! [ 322.237721][T16618] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:26 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:26 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000100)) ioctl$int_in(r0, 0x800060c0045005, 0x0) 15:33:26 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(0xffffffffffffffff, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:26 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(0xffffffffffffffff, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:26 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) [ 322.451408][T16629] debugfs: File 'dropped' in directory 'loop0' already present! 15:33:26 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) [ 322.502030][T16629] debugfs: File 'msg' in directory 'loop0' already present! [ 322.521244][T16629] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:26 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:26 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(0xffffffffffffffff, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:26 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x0, &(0x7f0000000140)=0x5ad) [ 322.708880][T16660] debugfs: File 'dropped' in directory 'loop0' already present! [ 322.717166][T16660] debugfs: File 'msg' in directory 'loop0' already present! [ 322.724686][T16660] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 322.881358][T16670] debugfs: File 'dropped' in directory 'loop0' already present! [ 322.889205][T16670] debugfs: File 'msg' in directory 'loop0' already present! [ 322.897291][T16670] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:27 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x8) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000180)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xa0}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="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"], 0x5c}}, 0x80) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r2, &(0x7f0000000000), 0x3) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x60, r3, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x20}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x400}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x4c004}, 0x44) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r2, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:27 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x0, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:27 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000100)) ioctl$int_in(r0, 0x800060c0045005, 0x0) 15:33:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:27 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(0xffffffffffffffff, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) [ 323.149896][T16683] debugfs: File 'dropped' in directory 'loop0' already present! [ 323.157754][T16683] debugfs: File 'msg' in directory 'loop0' already present! [ 323.165830][T16683] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:27 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x0, &(0x7f0000000140)=0x5ad) 15:33:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 323.372604][T16700] debugfs: File 'dropped' in directory 'loop0' already present! [ 323.380638][T16700] debugfs: File 'msg' in directory 'loop0' already present! [ 323.387972][T16700] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 323.557300][T16706] debugfs: File 'dropped' in directory 'loop0' already present! [ 323.565223][T16706] debugfs: File 'msg' in directory 'loop0' already present! [ 323.572729][T16706] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:27 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000100)) ioctl$int_in(r0, 0x800060c0045005, 0x0) 15:33:27 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x0, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:27 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(0xffffffffffffffff, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:27 executing program 2: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x200000) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) msgget(0x2, 0x288) [ 323.772351][T16716] debugfs: File 'dropped' in directory 'loop0' already present! [ 323.781746][T16716] debugfs: File 'msg' in directory 'loop0' already present! [ 323.789211][T16716] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:28 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f0000000180)="36351fbe3d297bbc5a05916749a784700aa755fcff7880646c32412da503904011ba54b4fb593d87093fa6c7891a6629d2f7510eb52920a2c5edf2bfb27675ade8bfb0ff5a625129e6c5a2c6624d233e4454540c", 0x54) 15:33:28 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x0, &(0x7f0000000140)=0x5ad) 15:33:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r4 = gettid() getpgid(r4) shmctl$IPC_SET(r3, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r5 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r1, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r2, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r6, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r5, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r1}]) r7 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r7) renameat2(r1, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 323.977902][T16737] debugfs: File 'dropped' in directory 'loop0' already present! [ 323.986389][T16737] debugfs: File 'msg' in directory 'loop0' already present! [ 323.994420][T16737] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r4 = gettid() getpgid(r4) shmctl$IPC_SET(r3, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r5 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r1, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r2, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r6, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r5, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r1}]) r7 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r7) renameat2(r1, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 324.168967][T16745] debugfs: File 'dropped' in directory 'loop0' already present! [ 324.176758][T16745] debugfs: File 'msg' in directory 'loop0' already present! [ 324.184370][T16745] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:28 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x0, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:28 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000100)) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)) 15:33:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001c00000000000000000000000000000100008000000000000000000000000000000000000000000000000000ea6e00000023000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000006c29c2109fa0385238983d678000000000456126d6d2411ff61c56cfc45067173e8292629dc33874a024525c3eb99d28e1dcf2d9cf2c28a9b3c390fdd50942f93618138012670b0de7d7a2f9f05a64998c058a99b58bf36934944207000000731addeeccaf0407715871fac0a8f7e82b3e6ac4f243f03ea7db1109cc1b6a0a262c7570ab6cf50c0f41bf147c97b61f312fd97605102e5fb6d3c16599aeada399ffa34bc49fff5d0718c28f3f4085bea5efebabebb27628694408e96608b4ed28c1d84594ba77b94254f18b7e000000000000537f75b86b79a7b0b43d01d9ca56d4fe3587c8172030e650c35e23ce8dae57fc9f6065f753584b022671d3e17bbf78c31bfea1d60bc2fce82864970a1aa7ecf29e63ebf7b9a4581b9550e7fd7926f4d258348cec506747c70b516aea34ce2eeb491861e4cfcf752d36828b1e58155e869a3d289bbfcbf8273164d9da820d0c1369313319d5780c8d04bfe688c51140645e69326e0354b8c5155d10e626a4c967fb18e41217c05dbd0b34bf7a49865a35b5595c9347fd8d6310c957d7df1646351ec9397ba73e73fbc3585ddb43a0c018279465d34756bea674e4be0a8b6ee2eed3e52e7778f0fd0ba5a48334b370e499e241e7ab2ddbeb8ffa7657728133e91e46950634f50547ba07e727f2eddb03b86c9d5211c80524e08a3abf35af3e90a45075843e48c17f8479e085067f882ec7b143097d80c57183b840a8f8dc9a01dee0e29f93927ba29270a74aa6fcecd344ccf40c9093e20fda2756"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0xc8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r4 = gettid() getpgid(r4) shmctl$IPC_SET(r3, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r5 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r1, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r2, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r6, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r5, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r1}]) r7 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r7) renameat2(r1, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:28 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x0, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:28 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, 0x0) [ 324.375054][T16754] debugfs: File 'dropped' in directory 'loop0' already present! [ 324.382851][T16754] debugfs: File 'msg' in directory 'loop0' already present! [ 324.393659][T16754] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:28 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) msgget(0x0, 0x400) 15:33:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 324.557614][T16773] debugfs: File 'dropped' in directory 'loop0' already present! [ 324.566087][T16773] debugfs: File 'msg' in directory 'loop0' already present! [ 324.573645][T16773] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 324.765020][T16781] debugfs: File 'dropped' in directory 'loop0' already present! [ 324.773038][T16781] debugfs: File 'msg' in directory 'loop0' already present! [ 324.780780][T16781] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:29 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, 0x0) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:29 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000100)) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)) 15:33:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:29 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x0, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:29 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, 0x0) [ 325.028686][T16794] debugfs: File 'dropped' in directory 'loop0' already present! [ 325.039697][T16794] debugfs: File 'msg' in directory 'loop0' already present! [ 325.064923][T16794] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:29 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) write$smack_current(r0, &(0x7f0000000040)='cpuset}&proc{em0security\x00', 0x19) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) write$P9_RSYMLINK(r0, &(0x7f0000000180)={0x14, 0x11, 0x1, {0x8, 0x4, 0x6}}, 0x14) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x104000}, 0xc, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="e8000000b679a4259100f74e2444e3713ef365adeafa694f0af29608ed5116b504ae527f736f6f9e72aa1e74ab1ecf1e201b41f9b542180217dd1f2bc818ad3a228305b902063bb37701d5e9d494aa363a2359dbc93bf1d9437d2a168f73e779b28469dae1b4776ce73f4caf9498d441f5d4c5a9e4a0e2", @ANYRES16=r1, @ANYBLOB="100027bd7000fddbdf251100000004000100300007000c00040003000000000000000c00040001000000000000000c000400000000000000000608000100f7ffffff54000500080001006574680008000100657468000c00020008000300c63900002c000200080001000100000008000200020000000800020002000000080001001b000000080001001300000008000100756470004c00070008000100ff07000008000200ff7f000008000200a30b00000c000400030000000000000008000100f9000000080001000100000008000100050000000c0004003e00000000000000"], 0xe8}, 0x1, 0x0, 0x0, 0x80}, 0xc001) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f00000003c0)={0x57, 0x2}) openat$cgroup_ro(r0, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) 15:33:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"]], 0x2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 325.246895][T16812] debugfs: File 'dropped' in directory 'loop0' already present! [ 325.254834][T16812] debugfs: File 'msg' in directory 'loop0' already present! [ 325.262514][T16812] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"]], 0x2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:29 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, 0x0) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) [ 325.442524][T16818] debugfs: File 'dropped' in directory 'loop0' already present! [ 325.457616][T16818] debugfs: File 'msg' in directory 'loop0' already present! [ 325.465317][T16818] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:29 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000100)) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)) 15:33:29 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x0, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"]], 0x2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:29 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, 0x0) 15:33:29 executing program 2: syz_emit_ethernet(0xfffffffffffffdfe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x224, 0x0, 0x0, 0x0, 0x406c, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)={0x0, 0x3, [0x0, 0xc0, 0xd77]}) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045429, &(0x7f0000000100)=0x3) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) prctl$PR_SET_FPEMU(0xa, 0x1) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, &(0x7f00000000c0)=0x7fffffff) [ 325.671614][T16834] debugfs: File 'dropped' in directory 'loop0' already present! [ 325.686804][T16834] debugfs: File 'msg' in directory 'loop0' already present! [ 325.703805][T16834] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 325.911137][T16850] debugfs: File 'dropped' in directory 'loop0' already present! [ 325.918970][T16850] debugfs: File 'msg' in directory 'loop0' already present! [ 325.928377][T16850] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:30 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, 0x0) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001c00000000000000000000000000000100008000000000000000000000000000000000000000000000000000ea6e00000023000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000006c29c2109fa0385238983d678000000000456126d6d2411ff61c56cfc45067173e8292629dc33874a024525c3eb99d28e1dcf2d9cf2c28a9b3c390fdd50942f93618138012670b0de7d7a2f9f05a64998c058a99b58bf36934944207000000731addeeccaf0407715871fac0a8f7e82b3e6ac4f243f03ea7db1109cc1b6a0a262c7570ab6cf50c0f41bf147c97b61f312fd97605102e5fb6d3c16599aeada399ffa34bc49fff5d0718c28f3f4085bea5efebabebb27628694408e96608b4ed28c1d84594ba77b94254f18b7e000000000000537f75b86b79a7b0b43d01d9ca56d4fe3587c8172030e650c35e23ce8dae57fc9f6065f753584b022671d3e17bbf78c31bfea1d60bc2fce82864970a1aa7ecf29e63ebf7b9a4581b9550e7fd7926f4d258348cec506747c70b516aea34ce2eeb491861e4cfcf752d36828b1e58155e869a3d289bbfcbf8273164d9da820d0c1369313319d5780c8d04bfe688c51140645e69326e0354b8c5155d10e626a4c967fb18e41217c05dbd0b34bf7a49865a35b5595c9347fd8d6310c957d7df1646351ec9397ba73e73fbc3585ddb43a0c018279465d34756bea674e4be0a8b6ee2eed3e52e7778f0fd0ba5a48334b370e499e241e7ab2ddbeb8ffa7657728133e91e46950634f50547ba07e727f2eddb03b86c9d5211c80524e08a3abf35af3e90a45075843e48c17f8479e085067f882ec7b143097d80c57183b840a8f8dc9a01dee0e29f93927ba29270a74aa6fcecd344ccf40c9093e20fda2756"], @ANYBLOB], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_tables_targets\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) 15:33:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_tables_targets\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) 15:33:30 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, 0x0) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) [ 326.121041][T16858] debugfs: File 'dropped' in directory 'loop0' already present! [ 326.139618][T16858] debugfs: File 'msg' in directory 'loop0' already present! [ 326.146997][T16858] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:30 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)) 15:33:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_tables_targets\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) 15:33:30 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0xfc71281c02ce12f6) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x9) ioctl$int_in(r0, 0x5421, &(0x7f0000000140)=0x5ad) 15:33:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_tables_targets\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) 15:33:30 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) inotify_init() read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) [ 326.396865][T16883] debugfs: File 'dropped' in directory 'loop0' already present! [ 326.408295][T16883] debugfs: File 'msg' in directory 'loop0' already present! [ 326.417043][T16883] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:30 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800"/76], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 326.656225][T16903] debugfs: File 'dropped' in directory 'loop0' already present! [ 326.674563][T16903] debugfs: File 'msg' in directory 'loop0' already present! [ 326.685102][T16903] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:30 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, 0x0) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800"/76], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:31 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)) [ 326.911391][T16915] debugfs: File 'dropped' in directory 'loop0' already present! [ 326.919966][T16915] debugfs: File 'msg' in directory 'loop0' already present! [ 326.927580][T16915] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800"/76], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:31 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) [ 327.058846][T16894] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 327.067618][T16894] FAT-fs (loop3): Filesystem has been set read-only [ 327.091558][T16894] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 15:33:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 327.125941][T16924] debugfs: File 'dropped' in directory 'loop0' already present! [ 327.158499][T16924] debugfs: File 'msg' in directory 'loop0' already present! [ 327.177411][T16924] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:31 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b2"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:31 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, 0x0) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) [ 327.363426][T16948] debugfs: File 'dropped' in directory 'loop0' already present! [ 327.375722][T16948] debugfs: File 'msg' in directory 'loop0' already present! [ 327.383175][T16948] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:31 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)) 15:33:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b2"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 327.552570][T16960] debugfs: File 'dropped' in directory 'loop0' already present! [ 327.567539][T16960] debugfs: File 'msg' in directory 'loop0' already present! [ 327.575204][T16960] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b2"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:31 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f00000000c0), 0xfffffffffffffee6) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) [ 327.763771][T16967] debugfs: File 'dropped' in directory 'loop0' already present! [ 327.771760][T16967] debugfs: File 'msg' in directory 'loop0' already present! [ 327.779205][T16967] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:32 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:32 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="d51fc6d2c897104ffb7e499583e532951d9c63df7aac3ddc425239f0c268bf8afe218808d1e497c96cc42cbdb7b5182017020905b7a433281474b1804bea75c8e7ba4356fc09b6010057673a88530450b7e3c82861ac0245284355609f5314d4a4465f146b1f5bdd5ac4d047164fdbcf613f3deeb28afc0df3ef2072c56ae032566dfd0499bed495ffe450fcbe183ead2f3f", 0x92}, {&(0x7f0000000240)="e858217e1e9e976df4dbe45ccdfe9dcd81a42c70f191c3ab2166a77e26e52ff8c6d1318c2562aa117f9e2d938f0e5287a916d433639bcd02cb19cab8a9f5c526c5aaa4416563646a2e5b893ac2406355d024f9a3ab651276f2e4765bd0b0f5bcce6d2eef8e3754cfbe16e41cd2cdd09dcc6dc0f84929b134eb928632b774b5a62646bd3ea76bd573b0636f8417faf2fc27fc32667a34", 0x96}, {&(0x7f0000000300)="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", 0x1000}], 0x3}, 0x40000) ioctl$int_in(r0, 0x800000c0045009, &(0x7f00000000c0)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681e"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:32 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) [ 327.981952][T16982] debugfs: File 'dropped' in directory 'loop0' already present! [ 327.992623][T16982] debugfs: File 'msg' in directory 'loop0' already present! [ 328.012278][T16982] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681e"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 328.318421][T17006] debugfs: File 'dropped' in directory 'loop0' already present! [ 328.326250][T17006] debugfs: File 'msg' in directory 'loop0' already present! [ 328.337513][T17006] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:32 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(0xffffffffffffffff, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681e"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:32 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000040)=0x7f, &(0x7f00000000c0)=0x1) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:32 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) [ 328.610902][T17014] debugfs: File 'dropped' in directory 'loop0' already present! [ 328.635786][T17014] debugfs: File 'msg' in directory 'loop0' already present! [ 328.654134][T17014] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a7169"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 328.848581][T16999] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 328.857322][T16999] FAT-fs (loop3): Filesystem has been set read-only [ 328.864073][T16999] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 15:33:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 328.908066][T16994] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 328.927082][T17029] debugfs: File 'dropped' in directory 'loop0' already present! [ 328.937041][T16994] FAT-fs (loop4): Filesystem has been set read-only [ 328.943990][T17029] debugfs: File 'msg' in directory 'loop0' already present! 15:33:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 328.952516][T16994] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17) [ 328.954366][T17029] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:33 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(0xffffffffffffffff, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a7169"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:33 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:33 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000180)={0x7d, 0x0, [0x4, 0x1, 0x6, 0x8000]}) [ 329.266067][T17049] debugfs: File 'dropped' in directory 'loop0' already present! [ 329.305526][T17049] debugfs: File 'msg' in directory 'loop0' already present! [ 329.342123][T17049] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a7169"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 329.615543][T17066] debugfs: File 'dropped' in directory 'loop0' already present! [ 329.644964][T17066] debugfs: File 'msg' in directory 'loop0' already present! [ 329.672790][T17066] debugfs: File 'trace0' in directory 'loop0' already present! [ 329.686229][T17038] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 329.698069][T17034] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 329.706841][T17034] FAT-fs (loop3): Filesystem has been set read-only [ 329.710756][T17038] FAT-fs (loop4): Filesystem has been set read-only 15:33:33 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(0xffffffffffffffff, 0x800060c0045005, &(0x7f0000000140)=0x5ad) [ 329.713607][T17034] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 329.735780][T17038] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17) 15:33:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:34 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(0xffffffffffffffff, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:34 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x311240) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) creat(&(0x7f0000000080)='./file0\x00', 0x20) [ 329.948233][T17078] debugfs: File 'dropped' in directory 'loop0' already present! [ 329.974804][T17078] debugfs: File 'msg' in directory 'loop0' already present! [ 330.027707][T17078] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:34 executing program 2: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x28001, 0x200) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000040)=0x80000001) read$rfkill(r0, &(0x7f0000000280), 0x601) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001c00000000000000000000000000000100008000000000000000000000000000000000000000000000000000ea6e00000023000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000006c29c2109fa0385238983d678000000000456126d6d2411ff61c56cfc45067173e8292629dc33874a024525c3eb99d28e1dcf2d9cf2c28a9b3c390fdd50942f93618138012670b0de7d7a2f9f05a64998c058a99b58bf36934944207000000731addeeccaf0407715871fac0a8f7e82b3e6ac4f243f03ea7db1109cc1b6a0a262c7570ab6cf50c0f41bf147c97b61f312fd97605102e5fb6d3c16599aeada399ffa34bc49fff5d0718c28f3f4085bea5efebabebb27628694408e96608b4ed28c1d84594ba77b94254f18b7e000000000000537f75b86b79a7b0b43d01d9ca56d4fe3587c8172030e650c35e23ce8dae57fc9f6065f753584b022671d3e17bbf78c31bfea1d60bc2fce82864970a1aa7ecf29e63ebf7b9a4581b9550e7fd7926f4d258348cec506747c70b516aea34ce2eeb491861e4cfcf752d36828b1e58155e869a3d289bbfcbf8273164d9da820d0c1369313319d5780c8d04bfe688c51140645e69326e0354b8c5155d10e626a4c967fb18e41217c05dbd0b34bf7a49865a35b5595c9347fd8d6310c957d7df1646351ec9397ba73e73fbc3585ddb43a0c018279465d34756bea674e4be0a8b6ee2eed3e52e7778f0fd0ba5a48334b370e499e241e7ab2ddbeb8ffa7657728133e91e46950634f50547ba07e727f2eddb03b86c9d5211c80524e08a3abf35af3e90a45075843e48c17f8479e085067f882ec7b143097d80c57183b840a8f8dc9a01dee0e29f93927ba29270a74aa6fcecd344ccf40c9093e20fda2756"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:34 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x0, &(0x7f0000000140)=0x5ad) [ 330.250584][T17106] debugfs: File 'dropped' in directory 'loop0' already present! [ 330.258408][T17106] debugfs: File 'msg' in directory 'loop0' already present! [ 330.269115][T17106] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001c00000000000000000000000000000100008000000000000000000000000000000000000000000000000000ea6e00000023000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000006c29c2109fa0385238983d678000000000456126d6d2411ff61c56cfc45067173e8292629dc33874a024525c3eb99d28e1dcf2d9cf2c28a9b3c390fdd50942f93618138012670b0de7d7a2f9f05a64998c058a99b58bf36934944207000000731addeeccaf0407715871fac0a8f7e82b3e6ac4f243f03ea7db1109cc1b6a0a262c7570ab6cf50c0f41bf147c97b61f312fd97605102e5fb6d3c16599aeada399ffa34bc49fff5d0718c28f3f4085bea5efebabebb27628694408e96608b4ed28c1d84594ba77b94254f18b7e000000000000537f75b86b79a7b0b43d01d9ca56d4fe3587c8172030e650c35e23ce8dae57fc9f6065f753584b022671d3e17bbf78c31bfea1d60bc2fce82864970a1aa7ecf29e63ebf7b9a4581b9550e7fd7926f4d258348cec506747c70b516aea34ce2eeb491861e4cfcf752d36828b1e58155e869a3d289bbfcbf8273164d9da820d0c1369313319d5780c8d04bfe688c51140645e69326e0354b8c5155d10e626a4c967fb18e41217c05dbd0b34bf7a49865a35b5595c9347fd8d6310c957d7df1646351ec9397ba73e73fbc3585ddb43a0c018279465d34756bea674e4be0a8b6ee2eed3e52e7778f0fd0ba5a48334b370e499e241e7ab2ddbeb8ffa7657728133e91e46950634f50547ba07e727f2eddb03b86c9d5211c80524e08a3abf35af3e90a45075843e48c17f8479e085067f882ec7b143097d80c57183b840a8f8dc9a01dee0e29f93927ba29270a74aa6fcecd344ccf40c9093e20fda2756"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 330.468180][T17116] debugfs: File 'dropped' in directory 'loop0' already present! [ 330.476056][T17116] debugfs: File 'msg' in directory 'loop0' already present! [ 330.486896][T17116] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:34 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(0xffffffffffffffff, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e75"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 330.684064][T17124] debugfs: File 'dropped' in directory 'loop0' already present! [ 330.708028][T17124] debugfs: File 'msg' in directory 'loop0' already present! [ 330.716241][T17124] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:34 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000040), 0xffffffffffffff96) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x8001, 0xfff, 0x7d00}) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e75"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:35 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x0, &(0x7f0000000140)=0x5ad) 15:33:35 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x2, 0x200) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) [ 330.994474][T17140] debugfs: File 'dropped' in directory 'loop0' already present! [ 331.069434][T17140] debugfs: File 'msg' in directory 'loop0' already present! 15:33:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:35 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(0xffffffffffffffff, 0x800060c0045005, &(0x7f0000000140)=0x5ad) [ 331.128715][T17140] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001c00000000000000000000000000000100008000000000000000000000000000000000000000000000000000ea6e00000023000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000006c29c2109fa0385238983d678000000000456126d6d2411ff61c56cfc45067173e8292629dc33874a024525c3eb99d28e1dcf2d9cf2c28a9b3c390fdd50942f93618138012670b0de7d7a2f9f05a64998c058a99b58bf36934944207000000731addeeccaf0407715871fac0a8f7e82b3e6ac4f243f03ea7db1109cc1b6a0a262c7570ab6cf50c0f41bf147c97b61f312fd97605102e5fb6d3c16599aeada399ffa34bc49fff5d0718c28f3f4085bea5efebabebb27628694408e96608b4ed28c1d84594ba77b94254f18b7e000000000000537f75b86b79a7b0b43d01d9ca56d4fe3587c8172030e650c35e23ce8dae57fc9f6065f753584b022671d3e17bbf78c31bfea1d60bc2fce82864970a1aa7ecf29e63ebf7b9a4581b9550e7fd7926f4d258348cec506747c70b516aea34ce2eeb491861e4cfcf752d36828b1e58155e869a3d289bbfcbf8273164d9da820d0c1369313319d5780c8d04bfe688c51140645e69326e0354b8c5155d10e626a4c967fb18e41217c05dbd0b34bf7a49865a35b5595c9347fd8d6310c957d7df1646351ec9397ba73e73fbc3585ddb43a0c018279465d34756bea674e4be0a8b6ee2eed3e52e7778f0fd0ba5a48334b370e499e241e7ab2ddbeb8ffa7657728133e91e46950634f50547ba07e727f2eddb03b86c9d5211c80524e08a3abf35af3e90a45075843e48c17f8479e085067f882ec7b143097d80c57183b840a8f8dc9a01dee0e29f93927ba29270a74aa6fcecd344ccf40c9093e20fda2756"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e75"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) [ 331.387686][T17169] debugfs: File 'dropped' in directory 'loop0' already present! [ 331.395920][T17169] debugfs: File 'msg' in directory 'loop0' already present! [ 331.403824][T17169] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001c00000000000000000000000000000100008000000000000000000000000000000000000000000000000000ea6e00000023000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000006c29c2109fa0385238983d678000000000456126d6d2411ff61c56cfc45067173e8292629dc33874a024525c3eb99d28e1dcf2d9cf2c28a9b3c390fdd50942f93618138012670b0de7d7a2f9f05a64998c058a99b58bf36934944207000000731addeeccaf0407715871fac0a8f7e82b3e6ac4f243f03ea7db1109cc1b6a0a262c7570ab6cf50c0f41bf147c97b61f312fd97605102e5fb6d3c16599aeada399ffa34bc49fff5d0718c28f3f4085bea5efebabebb27628694408e96608b4ed28c1d84594ba77b94254f18b7e000000000000537f75b86b79a7b0b43d01d9ca56d4fe3587c8172030e650c35e23ce8dae57fc9f6065f753584b022671d3e17bbf78c31bfea1d60bc2fce82864970a1aa7ecf29e63ebf7b9a4581b9550e7fd7926f4d258348cec506747c70b516aea34ce2eeb491861e4cfcf752d36828b1e58155e869a3d289bbfcbf8273164d9da820d0c1369313319d5780c8d04bfe688c51140645e69326e0354b8c5155d10e626a4c967fb18e41217c05dbd0b34bf7a49865a35b5595c9347fd8d6310c957d7df1646351ec9397ba73e73fbc3585ddb43a0c018279465d34756bea674e4be0a8b6ee2eed3e52e7778f0fd0ba5a48334b370e499e241e7ab2ddbeb8ffa7657728133e91e46950634f50547ba07e727f2eddb03b86c9d5211c80524e08a3abf35af3e90a45075843e48c17f8479e085067f882ec7b143097d80c57183b840a8f8dc9a01dee0e29f93927ba29270a74aa6fcecd344ccf40c9093e20fda2756"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 331.558144][T17134] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 331.566829][T17134] FAT-fs (loop3): Filesystem has been set read-only 15:33:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:35 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x0, &(0x7f0000000140)=0x5ad) [ 331.606052][T17134] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 331.646218][T17182] debugfs: File 'dropped' in directory 'loop0' already present! [ 331.688993][T17182] debugfs: File 'msg' in directory 'loop0' already present! [ 331.703636][T17182] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:35 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x0, &(0x7f0000000140)=0x5ad) 15:33:35 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$VT_WAITACTIVE(r0, 0x5607) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) [ 331.983583][T17216] debugfs: File 'dropped' in directory 'loop0' already present! [ 331.995146][T17216] debugfs: File 'msg' in directory 'loop0' already present! [ 332.005501][T17216] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) [ 332.221774][T17232] debugfs: File 'dropped' in directory 'loop0' already present! 15:33:36 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, 0x0) [ 332.278159][T17232] debugfs: File 'msg' in directory 'loop0' already present! [ 332.290080][T17232] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:36 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x0, &(0x7f0000000140)=0x5ad) 15:33:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:36 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000180)=0x8) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000000c0)=0x6, 0x4) [ 332.582036][T17253] debugfs: File 'dropped' in directory 'loop0' already present! [ 332.604628][T17253] debugfs: File 'msg' in directory 'loop0' already present! [ 332.635292][T17253] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:37 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, 0x0) [ 332.911615][T17283] debugfs: File 'dropped' in directory 'loop0' already present! [ 332.932275][T17283] debugfs: File 'msg' in directory 'loop0' already present! [ 332.955543][T17283] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:37 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x0, &(0x7f0000000140)=0x5ad) [ 333.198011][T17306] debugfs: File 'dropped' in directory 'loop0' already present! [ 333.224076][T17306] debugfs: File 'msg' in directory 'loop0' already present! [ 333.237219][T17306] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:37 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @empty, 0x7f}, 0x1c) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR, @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:37 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, 0x0) [ 333.554971][T17330] debugfs: File 'dropped' in directory 'loop0' already present! 15:33:37 executing program 4: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) [ 333.596668][T17330] debugfs: File 'msg' in directory 'loop0' already present! [ 333.631142][T17330] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:37 executing program 4: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR, @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:38 executing program 4: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:38 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, 0x0) [ 333.821882][T17356] debugfs: File 'dropped' in directory 'loop0' already present! [ 333.842788][T17356] debugfs: File 'msg' in directory 'loop0' already present! [ 333.853885][T17356] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:38 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR, @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 334.054446][T17375] debugfs: File 'dropped' in directory 'loop0' already present! [ 334.065243][T17375] debugfs: File 'msg' in directory 'loop0' already present! [ 334.076881][T17375] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:38 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:38 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f00000000c0), 0x8) getresgid(&(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:38 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)) 15:33:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 334.321498][T17336] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 334.330293][T17336] FAT-fs (loop3): Filesystem has been set read-only [ 334.336920][T17336] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 15:33:38 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, 0x0) [ 334.431138][T17391] debugfs: File 'dropped' in directory 'loop0' already present! [ 334.440061][T17391] debugfs: File 'msg' in directory 'loop0' already present! [ 334.447569][T17391] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:38 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) [ 334.704318][T17421] debugfs: File 'dropped' in directory 'loop0' already present! [ 334.713554][T17421] debugfs: File 'msg' in directory 'loop0' already present! 15:33:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) [ 334.761912][T17421] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:39 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)) 15:33:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:39 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000040)={0x1f, 0x44, &(0x7f0000000180)="c74a61f88907cc60ffe4a2ee8062906212ed2851c5f28db78059a1aeb5fa8826f09dd29580b2a1087cf5425d3654b7b99b4585fa25b28a923184f1e4912bfe29af2b9f7a"}) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x1) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) 15:33:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) 15:33:39 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, 0x0) 15:33:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) [ 335.108710][T17453] debugfs: File 'dropped' in directory 'loop0' already present! [ 335.123734][T17453] debugfs: File 'msg' in directory 'loop0' already present! [ 335.140045][T17459] FAT-fs (loop4): bogus number of reserved sectors [ 335.146653][T17459] FAT-fs (loop4): Can't find a valid FAT filesystem [ 335.154277][T17453] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) 15:33:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) 15:33:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 335.302935][T17480] FAT-fs (loop4): bogus number of reserved sectors [ 335.314627][T17480] FAT-fs (loop4): Can't find a valid FAT filesystem [ 335.416940][T17490] debugfs: File 'dropped' in directory 'loop0' already present! 15:33:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) [ 335.468373][T17490] debugfs: File 'msg' in directory 'loop0' already present! [ 335.482559][T17490] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:39 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)) 15:33:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) [ 335.567513][T17503] FAT-fs (loop4): bogus number of reserved sectors [ 335.592089][T17503] FAT-fs (loop4): Can't find a valid FAT filesystem 15:33:40 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) pipe(&(0x7f00000000c0)) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000040)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:40 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)) [ 335.867371][T17528] FAT-fs (loop4): bogus number of reserved sectors [ 335.871009][T17530] debugfs: File 'dropped' in directory 'loop0' already present! [ 335.882160][T17528] FAT-fs (loop4): Can't find a valid FAT filesystem [ 335.913610][T17530] debugfs: File 'msg' in directory 'loop0' already present! [ 335.926731][T17530] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 336.057581][T17548] FAT-fs (loop4): bogus number of reserved sectors [ 336.066601][T17548] FAT-fs (loop4): Can't find a valid FAT filesystem 15:33:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:40 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)) [ 336.177316][T17555] debugfs: File 'dropped' in directory 'loop0' already present! [ 336.197648][T17555] debugfs: File 'msg' in directory 'loop0' already present! [ 336.209965][T17555] debugfs: File 'trace0' in directory 'loop0' already present! [ 336.227270][T17558] FAT-fs (loop4): bogus number of reserved sectors [ 336.234397][T17558] FAT-fs (loop4): Can't find a valid FAT filesystem 15:33:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001c00000000000000000000000000000100008000000000000000000000000000000000000000000000000000ea6e00000023000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000006c29c2109fa0385238983d678000000000456126d6d2411ff61c56cfc45067173e8292629dc33874a024525c3eb99d28e1dcf2d9cf2c28a9b3c390fdd50942f93618138012670b0de7d7a2f9f05a64998c058a99b58bf36934944207000000731addeeccaf0407715871fac0a8f7e82b3e6ac4f243f03ea7db1109cc1b6a0a262c7570ab6cf50c0f41bf147c97b61f312fd97605102e5fb6d3c16599aeada399ffa34bc49fff5d0718c28f3f4085bea5efebabebb27628694408e96608b4ed28c1d84594ba77b94254f18b7e00000000000053"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) [ 336.350782][T17568] FAT-fs (loop4): bogus number of reserved sectors [ 336.357301][T17568] FAT-fs (loop4): Can't find a valid FAT filesystem 15:33:40 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)) [ 336.418007][T17574] debugfs: File 'dropped' in directory 'loop0' already present! [ 336.425981][T17574] debugfs: File 'msg' in directory 'loop0' already present! [ 336.433471][T17574] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:40 executing program 2: openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x400040, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) bind$llc(r0, &(0x7f0000000180)={0x1a, 0x338, 0x101, 0x3ff, 0x3, 0x401, @random="af7d7df6dce4"}, 0x10) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000000c0)={0x21}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000340)=ANY=[@ANYPTR], 0x8) utimes(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)={{}, {0x77359400}}) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000040)="ce066cfc5fd4865759491aee41f0d9eed14450b5f4592627471e35") 15:33:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 336.620647][T17588] FAT-fs (loop4): bogus number of reserved sectors [ 336.632789][T17588] FAT-fs (loop4): Can't find a valid FAT filesystem [ 336.653553][T17594] debugfs: File 'dropped' in directory 'loop0' already present! [ 336.666970][T17594] debugfs: File 'msg' in directory 'loop0' already present! [ 336.674795][T17594] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 336.819542][T17605] FAT-fs (loop4): bogus number of reserved sectors [ 336.835784][T17605] FAT-fs (loop4): Can't find a valid FAT filesystem 15:33:41 executing program 1: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) getsockopt$sock_int(r0, 0x1, 0x9, 0xfffffffffffffffe, &(0x7f0000000100)=0x4) 15:33:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) [ 336.973520][T17613] debugfs: File 'dropped' in directory 'loop0' already present! [ 337.003931][T17613] debugfs: File 'msg' in directory 'loop0' already present! [ 337.012094][T17613] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:41 executing program 1: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) getsockopt$sock_int(r0, 0x1, 0x9, 0xfffffffffffffffe, &(0x7f0000000100)=0x4) [ 337.067483][T17623] FAT-fs (loop4): bogus number of reserved sectors [ 337.075952][T17623] FAT-fs (loop4): Can't find a valid FAT filesystem [ 337.103538][T17600] attempt to access beyond end of device [ 337.110275][T17600] loop2: rw=2049, want=78, limit=64 15:33:41 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)) [ 337.115606][T17600] Buffer I/O error on dev loop2, logical block 77, lost async page write 15:33:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 337.263791][T17608] attempt to access beyond end of device [ 337.285312][T17608] loop2: rw=2049, want=78, limit=64 [ 337.291262][T17608] Buffer I/O error on dev loop2, logical block 77, lost async page write 15:33:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 15:33:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) [ 337.314420][T17638] debugfs: File 'dropped' in directory 'loop0' already present! 15:33:41 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f0000000180)={[], 0x800, 0x7f, 0x0, 0x0, 0x8, 0x100000, 0xf000, [], 0x1000}) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x4, 0x200700) read$rfkill(r1, &(0x7f0000000040), 0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x860}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000340)={r2, @in={{0x2, 0x4e21, @loopback}}}, &(0x7f0000000400)=0x84) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r1, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:41 executing program 1: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) getsockopt$sock_int(r0, 0x1, 0x9, 0xfffffffffffffffe, &(0x7f0000000100)=0x4) 15:33:41 executing program 1: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) getsockopt$sock_int(r0, 0x1, 0x9, 0xfffffffffffffffe, &(0x7f0000000100)=0x4) [ 337.361662][T17642] FAT-fs (loop4): bogus number of reserved sectors [ 337.368258][T17642] FAT-fs (loop4): Can't find a valid FAT filesystem [ 337.391750][T17638] debugfs: File 'msg' in directory 'loop0' already present! [ 337.400128][T17638] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:41 executing program 1: getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x9, 0xfffffffffffffffe, &(0x7f0000000100)=0x4) 15:33:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:41 executing program 1: getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x9, 0xfffffffffffffffe, &(0x7f0000000100)=0x4) 15:33:41 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400200}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x88, r1, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x74, 0x4, [@TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc8d5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}]}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x8004}, 0x40800) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000000)) unlinkat(r0, &(0x7f00000002c0)='./file0\x00', 0x200) fsmount(r0, 0x1, 0x4) [ 337.689021][T17667] FAT-fs (loop4): bogus number of reserved sectors [ 337.711502][T17672] debugfs: File 'dropped' in directory 'loop0' already present! [ 337.732533][T17667] FAT-fs (loop4): Can't find a valid FAT filesystem 15:33:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:41 executing program 1: getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x9, 0xfffffffffffffffe, &(0x7f0000000100)=0x4) [ 337.759667][T17672] debugfs: File 'msg' in directory 'loop0' already present! [ 337.781165][T17672] debugfs: File 'trace0' in directory 'loop0' already present! [ 337.896029][T17690] FAT-fs (loop4): bogus number of reserved sectors [ 337.903153][T17690] FAT-fs (loop4): Can't find a valid FAT filesystem 15:33:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 15:33:42 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getsockopt$sock_int(r0, 0x1, 0x9, 0xfffffffffffffffe, &(0x7f0000000100)=0x4) 15:33:42 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) 15:33:42 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x200, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) socket$inet_udplite(0x2, 0x2, 0x88) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f00000000c0)={'netdevsim0\x00'}) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000180)=0x1) socket$inet6_tcp(0xa, 0x1, 0x0) 15:33:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:42 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) [ 338.417220][T17704] debugfs: File 'dropped' in directory 'loop0' already present! [ 338.428026][T17705] FAT-fs (loop4): bogus number of reserved sectors 15:33:42 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getsockopt$sock_int(r0, 0x1, 0x9, 0xfffffffffffffffe, &(0x7f0000000100)=0x4) [ 338.468270][T17705] FAT-fs (loop4): Can't find a valid FAT filesystem [ 338.477491][T17704] debugfs: File 'msg' in directory 'loop0' already present! 15:33:42 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) [ 338.509988][T17704] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:42 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) getsockopt$sock_int(r0, 0x1, 0x9, 0xfffffffffffffffe, &(0x7f0000000100)=0x4) 15:33:42 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) [ 338.646899][T17738] FAT-fs (loop4): bogus number of reserved sectors [ 338.666589][T17738] FAT-fs (loop4): Can't find a valid FAT filesystem 15:33:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 15:33:43 executing program 0: sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}], 0x1, 0x0) 15:33:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:43 executing program 1: socket$inet6(0xa, 0x100000000000002, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x9, 0xfffffffffffffffe, &(0x7f0000000100)=0x4) 15:33:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:43 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x84) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:43 executing program 1: socket$inet6(0xa, 0x100000000000002, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x9, 0xfffffffffffffffe, &(0x7f0000000100)=0x4) 15:33:43 executing program 0: sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}], 0x1, 0x0) [ 339.308731][T17761] FAT-fs (loop4): bogus number of reserved sectors [ 339.317860][T17761] FAT-fs (loop4): Can't find a valid FAT filesystem 15:33:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:43 executing program 0: sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}], 0x1, 0x0) 15:33:43 executing program 1: socket$inet6(0xa, 0x100000000000002, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x9, 0xfffffffffffffffe, &(0x7f0000000100)=0x4) 15:33:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 339.587122][T17791] FAT-fs (loop4): bogus number of reserved sectors [ 339.618287][T17791] FAT-fs (loop4): Can't find a valid FAT filesystem [ 339.626713][T17799] debugfs: File 'dropped' in directory 'loop0' already present! [ 339.636925][T17799] debugfs: File 'msg' in directory 'loop0' already present! [ 339.647244][T17799] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 15:33:44 executing program 0: socketpair(0x0, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) 15:33:44 executing program 1: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) getsockopt$sock_int(r0, 0x1, 0x0, 0xfffffffffffffffe, &(0x7f0000000100)=0x4) 15:33:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:44 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$TIOCSRS485(r0, 0x542f, &(0x7f0000000040)={0xaa, 0x7, 0x5ca}) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:44 executing program 1: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) getsockopt$sock_int(r0, 0x1, 0x0, 0xfffffffffffffffe, &(0x7f0000000100)=0x4) 15:33:44 executing program 0: socketpair(0x0, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) [ 340.267888][T17811] FAT-fs (loop4): bogus number of reserved sectors [ 340.283413][T17811] FAT-fs (loop4): Can't find a valid FAT filesystem 15:33:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:44 executing program 1: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) getsockopt$sock_int(r0, 0x1, 0x0, 0xfffffffffffffffe, &(0x7f0000000100)=0x4) 15:33:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:44 executing program 0: socketpair(0x0, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) [ 340.477540][T17842] FAT-fs (loop4): invalid media value (0x00) [ 340.537796][T17842] FAT-fs (loop4): Can't find a valid FAT filesystem [ 340.555616][T17853] debugfs: File 'dropped' in directory 'loop0' already present! [ 340.567381][T17853] debugfs: File 'msg' in directory 'loop0' already present! [ 340.575981][T17853] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:45 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:45 executing program 0: socketpair(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) 15:33:45 executing program 1: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) getsockopt$sock_int(r0, 0x1, 0x9, 0xfffffffffffffffe, 0x0) 15:33:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:45 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000240)) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) write$rfkill(r0, &(0x7f0000000040)={0x4, 0x5, 0x3}, 0x8) 15:33:45 executing program 1: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) getsockopt$sock_int(r0, 0x1, 0x9, 0xfffffffffffffffe, 0x0) 15:33:45 executing program 0: socketpair(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) [ 341.238033][T17867] debugfs: File 'dropped' in directory 'loop0' already present! [ 341.251724][T17871] FAT-fs (loop4): invalid media value (0x00) [ 341.263079][T17871] FAT-fs (loop4): Can't find a valid FAT filesystem [ 341.272068][T17867] debugfs: File 'msg' in directory 'loop0' already present! [ 341.286342][T17867] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:45 executing program 1: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) getsockopt$sock_int(r0, 0x1, 0x9, 0xfffffffffffffffe, 0x0) 15:33:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:45 executing program 0: socketpair(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) 15:33:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 341.477588][T17895] FAT-fs (loop4): invalid media value (0x00) [ 341.519742][T17895] FAT-fs (loop4): Can't find a valid FAT filesystem [ 341.654268][T17906] debugfs: Directory 'loop0' with parent 'block' already present! 15:33:46 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:46 executing program 0: socketpair(0x1, 0x5, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}], 0x1, 0x0) 15:33:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) 15:33:46 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)={r0}) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:46 executing program 0: socketpair(0x1, 0x5, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}], 0x1, 0x0) [ 342.241018][T17922] FAT-fs (loop4): invalid media value (0x00) 15:33:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 342.294374][T17922] FAT-fs (loop4): Can't find a valid FAT filesystem 15:33:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001c00000000000000000000000000000100008000000000000000000000000000000000000000000000000000ea6e00000023000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000006c29c2109fa0385238983d678000000000456126d6d2411ff61c56cfc45067173e8292629dc33874a024525c3eb99d28e1dcf2d9cf2c28a9b3c390fdd50942f93618138012670b0de7d7a2f9f05a64998c058a99b58bf36934944207000000731addeeccaf0407715871fac0a8f7e82b3e6ac4f243f03ea7db1109cc1b6a0a262c7570ab6cf50c0f41bf147c97b61f312fd97605102e5fb6d3c16599aeada399ffa34bc49fff5d0718c28f3f4085bea5efebabebb27628694408e96608b4ed28c1d84594ba77b94254f18b7e000000000000537f75b86b79a7b0b43d01d9ca56d4fe3587c8172030e650c35e23ce8dae57fc9f6065f753584b022671d3e17bbf78c31bfea1d60bc2fce82864970a1aa7ecf29e63ebf7b9a4581b9550e7fd7926f4d258348cec506747c70b516aea34ce2eeb491861e4cfcf752d36828b1e58155e869a3d289bbfcbf8273164d9da820d0c1369313319d5780c8d04bfe688c51140645e69326e0354b8c5155d10e626a4c967fb18e41217c05dbd0b34bf7a49865a35b5595c9347fd8d6310c957d7df1646351ec9397ba73e73fbc3585ddb43a0c018279465d34756bea674e4be0a8b6ee2eed3e52e7778f0fd0ba5a48334b370e499e241e7ab2ddbeb8ffa7657728133e91e46950634"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:46 executing program 0: socketpair(0x1, 0x5, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}], 0x1, 0x0) 15:33:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) [ 342.456408][T10000] debugfs: Directory 'loop0' with parent 'block' already present! 15:33:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 342.502260][T17944] FAT-fs (loop4): invalid media value (0x00) [ 342.535432][T17944] FAT-fs (loop4): Can't find a valid FAT filesystem 15:33:47 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:47 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:47 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) 15:33:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:47 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e20, @remote}}, 0x200, 0xba3, 0x101, 0x40, 0x1}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000240)={r1, 0x56, "985d12a67049499cceaa0bc3a31e3b4590ee6df190af2fdb9c1801ea93e2ad0ed3018acf9a13cd5bd3716e09d2789514ebf69445ca5ed930a69cc1e752f20c96ad389d7d33879eba6a1184bee38fc0fb6ccd073db7f4"}, &(0x7f00000000c0)=0x5e) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x2) 15:33:47 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) [ 343.106409][T17970] FAT-fs (loop4): invalid media value (0x00) [ 343.128213][T17970] FAT-fs (loop4): Can't find a valid FAT filesystem 15:33:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:47 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:47 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) 15:33:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:47 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, 0x0, 0x0, 0x0) [ 343.503336][T18002] debugfs: Directory 'loop0' with parent 'block' already present! [ 343.529951][T18001] FAT-fs (loop4): invalid media value (0x00) [ 343.564682][T18001] FAT-fs (loop4): Can't find a valid FAT filesystem 15:33:48 executing program 3: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:48 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, 0x0, 0x0, 0x0) 15:33:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 15:33:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:48 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x5421, &(0x7f0000000100)=0x1f) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:48 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, 0x0, 0x0, 0x0) 15:33:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) [ 344.005816][T18022] FAT-fs (loop4): invalid media value (0x00) [ 344.042666][T18022] FAT-fs (loop4): Can't find a valid FAT filesystem 15:33:48 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340), 0x0, 0x0) 15:33:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 15:33:48 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340), 0x0, 0x0) [ 344.250067][T18050] FAT-fs (loop4): invalid media value (0x00) [ 344.277167][T18050] FAT-fs (loop4): Can't find a valid FAT filesystem 15:33:49 executing program 3: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:49 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340), 0x0, 0x0) 15:33:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:49 executing program 2: semget(0x0, 0x3, 0x40) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x7ff, 0x4a8040) r0 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0xca, 0x20000) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x5421, &(0x7f0000000140)=0x5ad) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x1) 15:33:49 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000180)=""/72) open_by_handle_at(r0, &(0x7f0000000200)={0x93, 0x4, "e6a8e60805a7af2578d170e58f3990d478525eb8ac881433dc999e2509c8a42a8d682899b68a399e0d903d6c477e19ebb686e83c6d7074040677ea921a102e74e9287a4e1d6b77cfdcc63aec55ef7a00c31436ac203a50e581bca37e8ecc3fc2ae65b0a6c739e2a8835455869c682f984dda5fa4d3dd720fb779b68ce239d41007e0c69f804d2deb46e83e"}, 0x80) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000040)={0x9ffe, 0x48ce618dd690e6b9, 0x8, 0x1, 'syz0\x00', 0x2}) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:49 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0}], 0x1, 0x0) 15:33:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:49 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0}], 0x1, 0x0) [ 345.228717][T18107] debugfs: Directory 'loop0' with parent 'block' already present! 15:33:49 executing program 3: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:49 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0}], 0x1, 0x0) 15:33:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:49 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video0\x00', 0x2, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f00000001c0)={0x3, 0x6, 0x4, 0xbd, 0x1, 0x81, 0x7, 0x4, 0x3, 0x80000000, 0x100000, 0x4, 0x7, 0x100, &(0x7f0000000180)=""/7, 0xffffffff, 0x8, 0x9}) poll(&(0x7f0000000040)=[{r0, 0x8000}, {r0, 0x10}], 0x2, 0x1) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x200) 15:33:50 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}], 0x18}], 0x1, 0x0) 15:33:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:50 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}], 0x18}], 0x1, 0x0) 15:33:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:50 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}], 0x18}], 0x1, 0x0) [ 346.114021][T18160] debugfs: File 'dropped' in directory 'loop0' already present! [ 346.123600][T18160] debugfs: File 'msg' in directory 'loop0' already present! [ 346.140810][T18160] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:50 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}, @rights={{0x10}}], 0x28}], 0x1, 0x0) 15:33:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:50 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x40, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000000c0)={0x0, 0x3, 0x1}) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r1, &(0x7f0000000000), 0x3) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r1, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:51 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}, @rights={{0x10}}], 0x28}], 0x1, 0x0) 15:33:51 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) [ 346.790432][T18182] debugfs: File 'dropped' in directory 'loop0' already present! [ 346.798221][T18182] debugfs: File 'msg' in directory 'loop0' already present! [ 346.826597][T18182] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001c00000000000000000000000000000100008000000000000000000000000000000000000000000000000000ea6e00000023000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000006c29c2109fa0385238983d678000000000456126d6d2411ff61c56cfc45067173e8292629dc33874a024525c3eb99d28e1dcf2d9cf2c28a9b3c390fdd50942f93618138012670b0de7d7a2f9f05a64998c058a99b58bf36934944207000000731addeeccaf0407715871fac0a8f7e82b3e6ac4f243f03ea7db1109cc1b6a0a262c7570ab6cf50c0f41bf147c97b61f312fd97605102e5fb6d3c16599aeada399ffa34bc49fff5d0718c28f3f4085bea5efebabebb27628694408e96608b4ed28c1d84594ba77b94254f18b7e000000000000537f75b86b79a7b0b43d01d9ca56d4fe3587c8172030e650c35e23ce8dae57fc9f6065f753584b022671d3e17b"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:51 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}, @rights={{0x10}}], 0x28}], 0x1, 0x0) [ 347.205080][T18209] debugfs: File 'dropped' in directory 'loop0' already present! [ 347.228886][T18209] debugfs: File 'msg' in directory 'loop0' already present! [ 347.237277][T18209] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:51 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:51 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}], 0x1, 0x0) 15:33:51 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) fstatfs(r0, &(0x7f0000000180)=""/4096) fremovexattr(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6f73782e2f64657615cc0db8a9184ea7ee2f6473702300"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001180)={0xffffffffffffffff, r0, 0x0, 0x17, &(0x7f0000000040)='user+wlan1mime_type\x19\':\x00', 0xffffffffffffffff}, 0x30) ptrace$setopts(0x4200, r1, 0x1, 0x44) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001c00000000000000000000000000000100008000000000000000000000000000000000000000000000000000ea6e00000023000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000006c29c2109fa0385238983d678000000000456126d6d2411ff61c56cfc45067173e8292629dc33874a024525c3eb99d28e1dcf2d9cf2c28a9b3c390fdd50942f93618138012670b0de7d7a2f9f05a64998c058a99b58bf36934944207000000731addeeccaf0407715871fac0a8f7e82b3e6ac4f243f03ea7db1109cc1b6a0a262c7570ab6cf50c0f41bf147c97b61f312fd97605102e5fb6d3c16599aeada399ffa34bc49fff5d0718c28f3f4085bea5efebabebb27628694408e96608b4ed28c1d84594ba77b94254f18b7e000000000000537f75b86b79a7b0b43d01d9ca56d4fe3587c8172030e650c35e23ce8dae57fc9f6065f753584b022671d3e17bbf78c31bfea1d60bc2fce82864970a1aa7ecf29e63eb"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 347.685201][T18231] debugfs: File 'dropped' in directory 'loop0' already present! [ 347.711929][T18231] debugfs: File 'msg' in directory 'loop0' already present! 15:33:51 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}], 0x1, 0x0) 15:33:51 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) [ 347.728671][T18231] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:52 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}], 0x1, 0x0) 15:33:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:52 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}], 0x1, 0x0) 15:33:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:52 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) vmsplice(r0, &(0x7f00000033c0)=[{&(0x7f0000000240)="660300ddf7745ab730471a234e9184870d6e50eb88a5a902cedb325b901b2a2320e82a6e28e78d7d7f333c89f5e609551be64162f4d1c46837ff9fb0c5cfb124fd020202e0e5ac95b3c633c4e2bdb9cfac9ce40822685a7a66b7b1a7371cd8020f30fead52665f8e4c295d37453fc135053415869de112d69c53971fb9d3bbf33b1dd873019d1cada9827cdfa396cf0dbfef6d00f345924fdba6ee6253545e852d8f6a94663a583d8dae70b293793e1e8e62341bc8dcbe1e7119298c70d7f56e067759e8cf8bcf7763be164d771840ac57e97c2b683595819c1135c1199c76cc62a703df984b7a85f1a312c16de4dbb5f4f9326a48933cf36593ae3c1f9428e5cfbeb5b2f61a03fbdd534e9164bdc79a956e4b1931d8ffdd7ada203e9bc87d21d31d8a574d061b7020d051a652a67d15eb6b29743d354d7881e52b95e3f5f103bf12688507eb415fcc24fbea93a9fd17174abc0a1418fb09f94f2d88dcf9562319203af7971409c1c399cc7eb4efc5f151b71efae5e06b9207c1e99720600ac1f5aa8468bc39d94fc7e769c10aa5ee1472e9a837832e204a93940595c595d05d3a4e5a497834d738f9a2176cba0836a33df2a3ffaa9e918472fe8ab85d12a429456996a22d041a793deaecef86df12aa0cd96cb81c2ac5801c65d4cdd0fb02cf0be23e7711d31fbaf5e436b8794c121f7568819ffa6578d4d2c83cb33d073ab335af4e253c52ce91ae3c64eabf116d292a34275e7a1290bcc4fb5470b088e0c6fd7d3041b2820464a97ebcf8dc234a77a3f4caf4e80b900ec3267aad2350628f252a87dba49d7b4237fd9f80a5ea7e103007a389eeb5a95725bd7a1fcf2d18631a1828b37f6fcf2b5013727c1a608063916a0cc39d4016d89df6f45d9adf13e5d97b2547e2735deac6434ade7d29b525a7360d783980a2104f66972e91bbc9eb1674eb881c30c3d311c759e7537e657dfa1e577cb2d2af3eefaa4a4e89930a46d33c9ff5660a2dddaecf35cff81e48a95d5bf033843fdab7cdd40aa6c341d34ec7e54c6e5638d76f0398447864a008c1be78e331bca322fa61e446890cd7d13faedffce8d953a30582437bd02c7b25c91569cb1701fa7140abd7c9d4c2b47f74a1841df7e9498af47adb48cc88f03438af7aa999764803a076df3fd69453f0ad1fa6d4633f629181b2d5e8e792ff0557895794d06fe190e0d5e639be15ced04dcee5b99aa3f1b187aa744edfdd96c7aed26632598b7f4d4a0671520e44978254811cc259c9b8b137a8ef9d470318f5fe5102f0627c2febdfd0f1d82dd36e2c75370fbb14637bdf6e354a512bd88ed2e135d27f00a11839bd233e5035e0a9a17f9e3515ee91bb9473d7bc29ff3d4f845bfdf23684d5d19c349e9767552f03e03d54e1c3ac6d5d8ea29e3695144bb15646376f1cd09c76826b04082e0a0e34fe430f19c25b6694dc1b9d79500192437b0f3151dea7866ad815040cfcd9e3d0a46b32ac0cf81c1c74ae2b98c750b4d55e8b4d0d3c3922afcaa6594ea918c78bc03f1beef1ba6c9602f884ac97b923a7726515a146cec8b837634aef8825efcdb33a06d77dd0233e733f1d39d1f9cf83f8fa81f64433ac34ad7682ffe4ff67be5cc52b02a7e4db8fe3f6c9c36a2e328e0f25494c10aa6559c7745d239dc09765a71b28d8de95fff87123dc70717e18517f5c7cdb98aaca0dd2052cb06a2059f1f2edf95d86ff6f71438ad195ba6a96610d32e9aaf8b32fa793316acc19c3df50355dd7233919f833bc6378e875e57fe4288773615afd2c106ede08366526d0159c6cba23f73900604a94325df0818873b2f8616796742e16d3ccc6e7c7d9949d8a4e4bd14645b2b34786e53adcf4f82b7a02c622e09037f7d34282353e8a9287242670997b9272fa1ecd3f9ec70db9d04c7fb8fe1fae5e8e9064dccb36a391f4e7204512891f226cbeb9a7c6c0b5a11496c8a4d1ef7ecb947e1e17e70d94ad4ef7997e9fee2d7c36282851cacb6def9cf60c40d59c1e2cde3059d5099aff81223c2fcb1daf4f0df6db794a460b2fc09dbd3072bda84e7690d8470a162e864de89f4e4235753c9b7c957c797b8f47b7219fc4542cb7127ebcbc49fb23a3fe0118b58e4eac04c26be0df3c2107131cdbd44e8660c885b548e4128d5451164953ab5a60972f75be780b7fa42859623eb5a3f6d23f3a2399513a1e6dd38293d02b2af3502d7655272fc28aaa88efe7052819f8884182561c174ee8e61d4d900bf7d868cee48ace4deec6997279184a8a3be8cd5c958d691809f46522d66da8d542b7135b987a5986433aa92edd2dcdc9e70c03187223ba108afa82c2c6a39fa3864680c875b1ca0b9b4042aab7de37c26a0cda44a7bbd811dc47dc8277fae393f8afdc12fa318f08b42fd7b4066dc2bda6f48852d011ec7807445a2669d36cfafd73d8c408f08ecb8de9d0f681dc0ffe0945e221448669227049f2187c5e7af70513e6cbc7fb1093a261b3850c6552d68d113dfedb5f56691c32553d5fbec8ab8283ef775e3f5d85adba08effdc6d02e9bd208d63c30d940cc4b10ab54937abb2fa791f030c639920a95c4ef038dec2a31385dddfa262985cfc3f4f477a2b3c6565d76d0ab7b9b4e4fd3b161cf92320ff02060dc2f3e87fa5e5ca4a1a9de3f1b9fd855887f8dc76a7953899780c6ef3149f4b074c22fef879c16077016a5076166715b4feab9696cc4d28067fca29897ce004847eb554201026f82c5e0f669c94a8e334bde234e4a0bfb141c203e079d64442e95101ae0ed974493b4803d1154b18d14cd645a310ee5c5fe01ec29880d0f933c7d96f76e59600b08e7dd8e71bd4d01df61c033b4e658987244e347cb6993fc2027a064193d72d2bb898ea764d4f8ca40091b8aae645ff7ac9f836bee88493fb46235078dd316860113052c4c1d173a204b0cb16c75bc61c88a26e4db31dcce6ce51ce8d8b74fc6debf12a78cee43e7c7ac89ffe89566aeff15fc8bbe8f9ba5e4d7983030e332626106b2e5db85bb4b81f80ba5fd0006dd01cdfb0b1cf4bf96ab95c2a22618a497c15c1a14971a5b3c44ddeb18561f4a27c18f60fdaa307b5ffa9dd140d580bbadb89db48dae907037cf2cd1b9a330c89be1fbdd2a80a5b218ebc8d9483b583f701eea89c913495578a0c7106aa02328417371e14d06f861b5a687f11e6abb096788c4a48ccd0e54905cb12e60030a9aa2b6bfc51551dbca2846861d9944912d351ae93ec6dbc419700e1b58306dcd6c4986c2f651640bc8811c101b0803b6a9ba1e1672ef65ebfc2104bd52c3d31abde67d82f0152a5663fa5b65d175d4ddbfae7944e8a0dbe145c39934e02c7b7a19034beb25647d1aff81e6a20be06804c8bbec5fd3c43741138a1c4216f5b6de9e3b515ecc82147658c321bd28e5e6c94b1789556175c64b9c5086dc5bfb3531ad6886c4ea063ec852b81a3f04159e26e23e1b383213c3008ef12fa5186d8f24546c0e8730e69c9fb0d013ff6b58b4018d6d3d8ada1c46207d07a06a56a0b3b5abc9089eb179fa5c3d05ed63f6fff23d392fb18916e9af6c6abc0590405a8b2f8e8acf85663c249c0f9cd74706706105791c6796b62ede9b6afd7324aa6be44f8c41523b2846643f0948051f35381e041200fe07ff07a51598dc4e806b4c16e87ca7bb0b40fbfd757f389e9ab5c11d3326c5cd5a1161d37858425b1b99865b2c7531f25c8bb30a6ede65ea3a99fa69ed4dd48cda928a3875e4408b022db944c8fc755b6fcac24d8080c7ed524aa3c9cc65a04e568a19a02bb0790e2e6f955aa22b13a1af393ca6a31a0935a2c434b385f78c28996b76f582b01964a33eedaa04d4e25317c3f1a35fa672c8c8d64951c186b573c06d0c6c57ea31c91fa46858bbde8e3a3896f71105b6299c630d7db9574d6d2522b34893559982e3d87c4d1e3c64fabf1186c1192acb645ad6d115da46dc4628831215cc95d3dfc9a901a9a12aa05b1845c036d391b355c64d6de6c324c0ab2cdb043b90b9b7aa101589d65c46458571e054060006cb3f63409fd508204f056b5f980d0a5105dbeacdfab8cbb7d6dc85936f623d9da09ec979b5dd178862901a3123677824dfed80436a06c8d637d497822bf79500f70051a60a3070ed821a8bce5f30ad4aa1858540151dbe87b3e3223e6cb56f03250cdfe0a343731a51a4578950151deb66b43e16cf3faecc8843784dfee891f50396bc6f84a7f272c0c14127dcfa32b6e9c2b5dfbe8c28effdd8143f438282c51b0ceff2048a31a4d367e49bae5c43ae553c05f85f43ae67c0d4310f29f110e60db3c1e7ee1b73017b8033f2254ac2a81bfb097244603a2eb3eace596aafb47d66e7de3401b6aa2e97dee5f3620756519953c01ded209b6fedc949dd55fe98cebea40e06147c139576f60f88c903726ac3d0cfa49a2a0496ab1e8ad29cbcaa19eedd22f03d5cbd45d43e733bc24efda89b14c373e5992da4cab4cc437888a6816ce40cb67c880adbd635db978ad10d2edd4681bcf32019ec943e26cbc95ca62c82401f3a013251e54d813d349f3f2dc74681287866ff70e94b4401e33d5b84fc5151eed711392dfca1141d0bd7375e75358f98e929c870eee71b300cea2a7bb37ed715ff8287598d8f4b2f9f58e3ae333f293a5e885f2d5cb774171ed854005db88bdfc92c12c9a5f4e86d9d861f74c100725700d5991f48e3cf98f7e3c9a9681ae4c3dfbb9522c1e426ab3c65d7069eaf2f06839d5a7189bdd2167bea730c0d7b36b7cd9aa778e9dd12ecfc25e8543250a17d8a5433b9778f3608964ae32d3ecf1ea7a1b97570e1ddd3a29de769527df9b786249adf865ea0ed83337296e0b1fd62613059a8bded4ff690d07e08415e2c7cf9968cd8cf4f6148152f9d8ad8d86d41862191fc4168f1009ebed9d3adab086c0d19f2cdea27c2d215ad97ddddce6610fadd567e87d2796676254ab67f63e9d29559ddd91064d0389749026d3855768635a21a99b6f30973ea8f3c97741c3803172a1d410e0d70b2899b54c8e7d3401f0adea1fb797e010efe6833f6406711f6a1af09dbde51e96c366c8617147857bce1dba8c70bdf0924f775f21580932bcfc3816ce3841f99f865eebee89d22ab9e210b0ecfff44f0a16ec4d82d22614a802e1611480e38bd0e2215ee36ce62e512896ba5c73434f8c3282de00c8b493ad990eb01f3a424cbac2c0d4c9ce6b865d7ec88da450d1e3c86e0e53bc9e87904be7f4f51f518aab799d3e5cf17d7ff033a830e129f6d454670d1de3210f59ca83de5214c9693ec877cd23a7b83ed9b892b5d4b76b013be65350ed7fc958579e32984df768322518745a9eeadf138ec47f58811e1e8b4e699abcf221b0f9b159bf84229c333864b31303fb3ece3c4f75d573e195d6e275b8eaee729db82902d55689871dd11e4c5c303f13cc3b7f292b800ceb2e836d77f6606780ea3e48d4a07efa60aa418b6f3fb3a31e19f6dc8fe6a40cf4609c671146ac897bed16c1bdd4ce5fca96a3b2bb6b908c04719d98adaec294a5a28daee02202baca93563f7ced43d125e04c510170390ba0bf68a75a52efdb84c8023b5894a76e892e5533a95e76b5a8ae34ccecbf05302ca5947d763afbc8c19f6c9def5bda396f9ce244928a180c4d841cb17fd7c4f061bc2604fc5ba50de9f96bd7771c02a19baa3cd01e6530f4ff72afc0eb3abe969816edc4683dc445add8834717148181628f7ee4f6468418c14eab138152fafdb6dadf4e809572219d425049c774bcfee1887998ecc646a7130", 0x1000}, {&(0x7f0000001240)="e92ea35c7e06b951f63e5045eeef65e45d2c39283bf3421adb644e5aac8cf89aa8b8fe507b7bdb3a04d03c92c0a45a0bc067e6ca6e7814890002826bec8818d3e2c6f464ec87b9405cfc56c39da4e4ba2dc4b870f33d5a409cd08ed95436072cd76f569732c049db4f8bb619ba2610a51a3cfa05ac20761da075f17f253005434e81b065a67a8375e63409766859e290bf6c5f18dbf7", 0x96}, {&(0x7f0000000040)="e4ddd29d6204019b04e0b984309d862f3a2bec6aa075000fc1a47ce7274da9899e", 0x21}, {&(0x7f0000001300)="933be1431ded3766568a8666be3f98293d381b4b398ccfa44b56554b415b94abd3a1df280b1cfee640ceee539eec4f9eb458f77f85008d0d7da39091463d43666bb8f124f41e0a699b753518f7c1b5e7e1fa06fc1e3d7b59148c333420c22fbc7112b76ca3d627d62c2b2e62d1ec5f3c9440df345388216c8b17f1d6fc136655f42aa63df0a69ab6513d0be658409bc85aaf746191ae1d3f6f17e795c494c7a0af88a97d31b6f433ab2fecf99d9f41c18b0e8793dee7643a174e94e23f31c0bdd3dc04a1546ddba519e97588e0443889eba11aad17196e37139660c1cb30b2e1a485984ac72ca631b48255954a2f38fb78510722c6b089eee8276c5b6d4d8af130b08d03a07bb073719cf3d7875697bc0348c42bba067f1db991206dd218c97b750b030c9e3c5628eb22ba0507cd758b75b1979ccba115cc0a8af690d363c4916acc5673ce8c1b506ecc684be125dcd923e329b24e0dd9ae379d5c882746b9e0e4f0adb2e588bfe9355a0f0f797aa0b8f0e283ff84baff1ec57c8f97a35d0149edcc560fe32ef5ce60732048f816e88b5a91a2f20ddfbf2150e00a6f51c9718210f098a305ed2c24f9c00e25e50982b70593e6d5b659f1e876c60b5147f74bcdba26b63f912f63e0155252641fd1f26418df9c6c871edb54b9a3ea780b4b31c0a1be84e1a17b05f5f053f25d188fce57c55eb25d023720e38cf41f262323836e02a42876785ee34a38c377f7118607b002d5cac9fea527d1ea8f3d69c9067cc7c2479645dc1fadf9a02f7754774981225d06ca706bb6174ea494439ee2da6bd890764d9b7d8526456a90ba30bbc0ce65076adc17174b73439d175506961d056f140426479f86732f38bd031ac7bf70f618ff3be73eb42c0a408ba6516a0d25735acf0b8f1b82a03fecb4cf2d84f3fbb6a2e44bdc0f713c7271f00467863c7c53444cb5961117495a9785f8013107b1527d17ecb7e0804640b02cf42ee715c5f4c9bcff8aacdd301e13a528dc3ea633df0e9a5a09c7b29beef706294f788527e78fbf1c8d1221d52d92c48942b8a7148b701520158fbfbb740dd7e8b6f2e0307ee06edbe313f76bcc1379edbcc564e50e7c8937075ddd98fb98cca5b629d244db8c06761f37d94a40ba60181eae028f6768dcf4ae5f4b57c08f01f143852a2a25a8f651929d12e8cbd0fa298ece1bd5e3299798144c06730e6dd6ec277d45b1fe15946e7c92c7bee5df91efdc5d2dd909b8d930e14d1ea42dc0582bd632913be6021c0cda2395dd182cfa90ad1ee0989a25f16cd630314faac9e344a39049846682f85719692ac1ab3fd93ce68d63159f366efe04a3eac580f8f30d2048ebe795422ac9d23f9f6a7c9bbf3b6da887ceb6d74dbc8444abfbf59ba23dcc3940f021ac65a93e38bc81fb61184f22656010827831b12a6cd143250d9c34db0c2a2a247c09b82502bce3b4351bfccebf75973512c744923d05dfe1921ecb34b41132a03533c9c936c0bdad4deb31c4881c365cba2972fe3e132e04e3a4d82369dfc33126ecbe962964404713815e09d25381f0845a5353cabef675bfef204db1518ad888520d11723050acd1e4cdfdae85f5b3d4e05e6c22b998a9741cfab9e3d9f49c504f1e0c01fb18445c38aca21fb3b498edcd8c78913ae381ac6f9973878ab82811728de95b5677b93b841300635fae8cd15e0f6f64dc6d5fc394dfd20393d32aa45db59d8b1719fe3efb0dd5e0b9e100957e1208866ca9aa084110a67bcefb2885e2dcd807e4eae8a96ad0c1bf35f69305f841b9af752ff2ec667fd65ee1b454ce2ec7c242b52cdaaa059d65e2bd7da73b69c099a649fc93e12949e4e4856960f21151f06f6e24f287bafb09dbe7f0403b8f3d907cd2afb5b4773aa949af03c61bd7b6851f1340c0c86de791cb7e6a334746024d56e4d94e1ffc3851e902d2625f603e674b358a09eeadace6b297600762bf596bef0a2be978769bf7cff26082ba4a0096466dfa53098d3aa8bb73415d7845fd7e5758bba7464d7b31cc4ad95c8f3e5f2a8a7906b47bd6fd678f5d6de2c0aa87d9f0cf64e58f27ac9145155dc42140daa23723c14df1b3713cffdd9c8b04d53e03bc2f44da5669d13f661b9fe41da158359d6384d6a599ee2f8614692019f2b90c09578fb4cbee0e610a449b788b5d11aae371216ecc284c0c397481eac3cd326bad083524cdb825e650ca53c0d1053b003911c698531d97f26bb23b41aeaf96969c6b63bf95c4863449cc099da5e5ce754dfdcd10cd04999f0a5a327cf7cd01225763394e5cfd49f3bcf5a3e73cff6c050939990e691bcbf8c68138e429a3f27c6d2b171c28b9e160f7e438953a2b89902cadb879d4a93b2313064f1bab2d493eaa7571def7e2b0a4887fa4674a36dc26e2989fcf29a5564e854e3a5db7e29229e880efc5a49c23afb91935f534cdbcf90a417b35c95d245a173bc931a480adfd5bd0cd366aec6c5516f479edda23e13ffed474a013030cf1f31bb48db1a919ea7081e430463e0c76b93f3d7a93a6db15628110ca38dfee71c0b9d06dd69bcc768751d1e403abfb509f0c9f2648786bbe82c7067320db8d059f32cbe83ee30dc26ce2bbced964c313c067dbc1238a879d7b86540d2a658645693f5f0f95e79e7deb7cf0ba774cdaf781beaf00abbe9044d7833de453fa622cb1399cde51fd99134e06cd7a38b300af7d30e12bf57b9461ea911e9ed623c3bc48e824732577bb0562db626df00e5385d317cc6bf261b36852eb353a4cdf747c23f3b2ebae4c84330bbce6becc61f6405057b099bdf54ade5f728add735083d5471a2097b58e39ab04362af4ac6554f44d77be847ca517f36a5623d7c3a59528c85751f233d7a13997b97cbaee8f34d93bcd7743cb10d4a4647635600744a69cd42721fd251a80cce4c766a0f2e47034871d7df2adb13d049a499fc29775e8fa2d3c98a3fb867c27edc7a25dddf21bf3213f16e88a9719ab26f1b96167c8944a272a87f4b3dc9691f40a3b1ffc38c7918a05b8ea6ca79282ef0cebbce3c459136b03a972cdde293d4c0da80b9c79e0b3f604f96ee48cfdd224149e2197d0a56b62b9718fda8c1130cd4e51b4635d580c895185ca59f3ed090230ec2f7189ae5edf0593c338f4840acc8c39923795d23071c6daefeb1b518d6da5cb50da975abcc1893bda3db072b709768eb39754b07bb980af5bc23e1e6558bdafff9ee78867fa9c926ab1c5e3c168dc341bb974491da76cbf9c2810fe83d23789a65f45ddba28752b2e265e3abc25533cd9fc2af45fb5091c56cbe1148a0d60fc30fd163f8770514f22725aae98d4677f09af03cafeeea62a72c6ddc67afc6168b560e9e30f0fd5cdc892a481892c0b21ff9f743f4e8a64a41a9b8ff2f91205d474ffeaaa874a5a728e85391e19d3c1f0ef68de14f9200a29f1ea399cac045380c9e6297f80e6c2ed3852f14e6ab5e0e377865be366d23d7a941a622a8cb7215c7b19e9a3c14ce8601bb1f771d986f2ea637c4c802f1c8e063e82c8385b8e09708c8c9ac183690da52bec852fa0933a200303da47d7eca3b43155d1125c49281565d75a11f963def4d5d27e438141ba2aa00ef16d5c7ec60785cc652e36ac9e1680fa2ef06c1059586de8ad430a40b9f5550856852e11d80ee924703d992eb031af2980003b79d6a1d2e4048c19c03854a995520a8cff2ed5cbc7894e18eff73f43ae442c925640985e4a67175e34791b564495c31edc861899d96648e500616b284345101375ab62ca351c5bd6c078a5c658701f32a5c84d203fc23db8627384886451d94136b8ad247867618973a6b05ebb021da0c0fcab77cf6b9d755b6e424a401aa60a905a322e71b1f31e96f24158b4e17a2dc704d3cdc2437961e671afce27d660ec32c501d41dac05856836150d066d4eb888637c89b8ea5754b5325cb8d3a946aa915e338fbd6702dfaa9adc78c22f679a4be9a94dc9c08846b12de99c2abc504c61128a4079506ffac2e5304e15cd5e6133eb4944893a3ab0b00b09d0ed621347b74db34b9996284610bd63c804dafbbabc29326410026ae4d77038f2911eba052892988791ab4ab7f42313f8b7f862d3ff15dcc16e49ebe995bd207b9b214feb9408b53ff713236e393c3b685337a5c61d92022dab4aa76937bda8a3dd98f88f83f4eabf7aee5b1220e27c338b2e50c8e8612b73023fe15deadb5b10489e112c768dc53e1b51f5c9807d6ee1bf7f68306f3575cebd63aa06246b6641435e68c58839935806e05d4d22d76018ad3cd080f65cb7ec0db9580ad8e9fffc3785ee347a759bce7b07550c3598aae314b71019e70bf24df2e7f3ba010715f66265f1b483ac045a443b990e399c9166e8abec6cdb67510d08b1acfd043372bce8d751c86fd81735c9b8dbceebd10f0daa343a00eb6c7e081dabf3716f25223b2315d45f98b0fe04e35483ab9f021046e4fe7a39cc301764ecc0e2f7550ba30d27a865722d5882c56eb1542ba28b1329d2214f60c4a3f1dab034ad511e6aec64e853731e9cbe64e632376467a18c673ef6e824f7be59c0b249c9074a095f252b78b8c1a60981bf75db199d16d70631a0a60bbdedb38f269ea56437f52aeba6b127cf92dedcd2ffabea183a6b7eca32bfb163900d8dd55ad31b4499bfc0a65fc569867d0639a4812f536e43cbb08947bbfe5525ae3126ed6b3a187cb07b77e3eafdbac1a0731a3a64fee5068aac435fcad7dc92b8b85679c69ebd9c7f7fe86ab93c49971f32dc3c6eb90e3614341941782a378fd92bec61cf20210c90014789e3b7f1decc5e1efc3c6f208b9e0b4b9ee46b8bb01f4842fdc8c56b9a35d9899e3a03344bdc4b567090b55cbaa5dd8559b9db850a985e769d0c00a9610437ac5c008ce56807ae77ef8b71d87bbd0e8232f03fe30d2f48ce2374e99c1c3bd8da7ef85cb0ed4d8a57e0525e9480fc6e1d58dd24da8bc1bbe5422dbfc60333d3f882cdc1f5f651f569ce1eb1c8d271326553f9e9cd95af70de00aaf591827129276d1057a9f313027894d4c17756b9a13ddaebf4b94e66676417836e34cc2ea70c998f590f829c3cf66408bd2fe1fc2ee959a26966ea31d6e9e9f7c7a9ec2af61384a3283fa21af24cae80a7fb0bbf56e00017f50cc98d7be9c8492811180ffe341678fe186c094fc6badcd7752e4128ab2b9d9ac70ac6d8506cee2463da8ca5214100495c3f33cb4d9c42035e79d3d16aef87e6efa126449d647942615abed94f4242902c4d7a7075ac67c4db784dd647ba0734c6e554732c7f0c36644aeae330bd56051442a6e047d307c96d48bc3de92063f7d7e9b97ea2bccd12408bd507122a7f85894db9193eabb1df13f2a6bfe72154ee1156baf4e7437e535f1af0db1eca3b4d5deb326ed4c432e25af924fe906664f87ca1b16dc32add9ec9c16019c76952a3b55f57e727daf29d0c4aa434d8ac3f9a16fd352b6394096df5250ce7d49b8171fb45c603d594d31002156af429d33606b84d2ff04c1fcac540bbcc66b5a56a9e73130332fd191bb76bddc99845ef14ce24c79d2f3c32f5f45326a9b80c9528585c687ee112b46bd42aee87d005eb18dddc15f88945143b00a0def9bc3b242cd07d0fd402800c1d8779758ed81ac86d7920067866d145cc88d06b79955f2a71f8139243727069ef2dc2035636821528e1b6338be8dd0f987263a22145dc24249842b33510ee337129cce5695b61cb06059022ab30b74aab5a401829521be7ad3a57190432e372b557ce1c29730d0e0a1f5b8c33019249ad", 0x1000}, {&(0x7f0000002300)="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", 0x1000}, {&(0x7f0000003300)="780fd1fbcb48d4e325fa65439b50b99307c0c9175e09d7326f733b724418cb5ce88927a3d2383b8805d15a617eb4205323bbdc8ae88d28c9189f1984c8341646e77bcd8e3d19fd1648923df403605549df2de0fd16af27052f0506c666ca92", 0x5f}, {&(0x7f00000000c0)="2ad25a448d10e613a5cb3c675295e8f000a1f51d78f8ffa5733f905440a8a45e", 0x20}, {&(0x7f0000003380)="3927f65c0ebfe15871d3409c53027b2b86c67d7adb3ee1", 0x17}], 0x8, 0x2) io_uring_register$IORING_UNREGISTER_BUFFERS(r0, 0x1, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000003440)=ANY=[@ANYBLOB="2321202e2f66696c6530205b6c6f6e6f6465766c6f2b2c252f626465762d747275737465647b260a4cd799a17b9a55d77fba55f3d1093b55bad7d03c82f1d900446569a9c71b76b9c81d01221f2423fe63e7c1f598502b64cb03e2d79d8882fa8220ad6990be8af35205aa5c7cfdbc11103f1cb22f5f46f5bf7cb9551006881f007b0c86f5d677688449a58ce7be97d3609e73498dab8a1214c1ad402dc9e658"], 0x81) read$rfkill(r0, &(0x7f0000000000), 0x8) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:52 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}], 0x1, 0x0) 15:33:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:52 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}], 0x1, 0x0) 15:33:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:53 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) 15:33:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001c00000000000000000000000000000100008000000000000000000000000000000000000000000000000000ea6e00000023000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000006c29c2109fa0385238983d678000000000456126d6d2411ff61c56cfc45067173e8292629dc33874a024525c3eb99d28e1dcf2d9cf2c28a9b3c390fdd50942f93618138012670b0de7d7a2f9f05a64998c058a99b58bf36934944207000000731addeeccaf0407715871fac0a8f7e82b3e6ac4f243f03ea7db1109cc1b6a0a262c7570ab6cf50c0f41bf147c97b61f312fd97605102e5fb6d3c16599aeada399ffa34bc49fff5d0718c28f3f4085bea5efebabebb27628694408e96608b4ed28c1d84594ba77b94254f18b7e000000000000537f75b86b79a7b0b43d01d9ca56d4fe3587c8172030e650c35e23ce8dae57fc9f6065f753584b022671d3e17bbf"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:53 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) [ 349.474209][T18335] debugfs: File 'dropped' in directory 'loop0' already present! [ 349.499078][T18335] debugfs: File 'msg' in directory 'loop0' already present! 15:33:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:53 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) 15:33:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) [ 349.531073][T18335] debugfs: File 'trace0' in directory 'loop0' already present! [ 349.558312][T18344] FAT-fs (loop3): bogus number of reserved sectors [ 349.577244][T18344] FAT-fs (loop3): Can't find a valid FAT filesystem 15:33:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001c00000000000000000000000000000100008000000000000000000000000000000000000000000000000000ea6e00000023000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000006c29c2109fa0385238983d678000000000456126d6d2411ff61c56cfc45067173e8292629dc33874a024525c3eb99d28e1dcf2d9cf2c28a9b3c390fdd50942f93618138012670b0de7d7a2f9f05a64998c058a99b58bf36934944207000000731addeeccaf0407715871fac0a8f7e82b3e6ac4f243f03ea7db1109cc1b6a0a262c7570ab6cf50c0f41bf147c97b61f312fd97605102e5fb6d3c16599aeada399ffa34bc49fff5d0718c28f3f4085bea5efebabebb27628694408e96608b4ed28c1d84594ba77b94254f18b7e000000000000537f75b86b79a7b0b43d01d9ca56d4fe3587c8172030e650c35e23ce8dae57fc9f6065f753584b022671d3e17bbf"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:53 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) 15:33:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) [ 349.836568][T18368] debugfs: File 'dropped' in directory 'loop0' already present! [ 349.857562][T18368] debugfs: File 'msg' in directory 'loop0' already present! [ 349.876054][T18368] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:54 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) 15:33:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r0}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:54 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={r1, 0x9e6}, &(0x7f00000001c0)=0xc) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) fadvise64(r0, 0x0, 0x80000000, 0x0) fcntl$dupfd(r0, 0x406, r0) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000040)=0x5ad) [ 350.388220][T18391] debugfs: File 'dropped' in directory 'loop0' already present! [ 350.400211][T18391] debugfs: File 'msg' in directory 'loop0' already present! 15:33:54 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) 15:33:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r0}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) [ 350.440251][T18391] debugfs: File 'trace0' in directory 'loop0' already present! [ 350.505963][T18400] FAT-fs (loop3): bogus number of reserved sectors 15:33:54 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) 15:33:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 350.577352][T18400] FAT-fs (loop3): Can't find a valid FAT filesystem [ 350.656819][T10000] debugfs: Directory 'loop0' with parent 'block' already present! 15:33:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r0}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, 0x0, 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:55 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) 15:33:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001c00000000000000000000000000000100008000000000000000000000000000000000000000000000000000ea6e00000023000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000006c29c2109fa0385238983d678000000000456126d6d2411ff61c56cfc45067173e8292629dc33874a024525c3eb99d28e1dcf2d9cf2c28a9b3c390fdd50942f93618138012670b0de7d7a2f9f05a64998c058a99b58bf36934944207000000731addeeccaf0407715871fac0a8f7e82b3e6ac4f243f03ea7db1109cc1b6a0a262c7570ab6cf50c0f41bf147c97b61f312fd97605102e5fb6d3c16599aeada399ffa34bc49fff5d0718c28f3f4085bea5efebabebb27628694408e96608b4ed28c1d84594ba77b94254f18b7e000000000000537f75b86b79a7b0b43d01d9ca56d4fe3587c8172030e650c35e23ce8dae57fc9f6065f753584b022671d3e17bbf78"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:55 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7fb2) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:55 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) [ 351.323890][T18441] debugfs: File 'dropped' in directory 'loop0' already present! [ 351.349294][T18450] FAT-fs (loop3): bogus number of reserved sectors [ 351.372808][T18450] FAT-fs (loop3): Can't find a valid FAT filesystem 15:33:55 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) 15:33:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, 0x0, 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) [ 351.397024][T18441] debugfs: File 'msg' in directory 'loop0' already present! [ 351.423511][T18441] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:55 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) 15:33:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001c00000000000000000000000000000100008000000000000000000000000000000000000000000000000000ea6e00000023000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000006c29c2109fa0385238983d678000000000456126d6d2411ff61c56cfc45067173e8292629dc33874a024525c3eb99d28e1dcf2d9cf2c28a9b3c390fdd50942f93618138012670b0de7d7a2f9f05a64998c058a99b58bf36934944207000000731addeeccaf0407715871fac0a8f7e82b3e6ac4f243f03ea7db1109cc1b6a0a262c7570ab6cf50c0f41bf147c97b61f312fd97605102e5fb6d3c16599aeada399ffa34bc49fff5d0718c28f3f4085bea5efebabebb27628694408e96608b4ed28c1d84594ba77b94254f18b7e000000000000537f75b86b79a7b0b43d01d9ca56d4fe3587c8172030e650c35e23ce8dae57fc9f6065f753584b022671d3e17bbf78"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 351.752783][T18479] debugfs: File 'dropped' in directory 'loop0' already present! [ 351.761977][T18479] debugfs: File 'msg' in directory 'loop0' already present! [ 351.772568][T18479] debugfs: File 'trace0' in directory 'loop0' already present! 15:33:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, 0x0, 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) 15:33:56 executing program 2: r0 = socket$isdn_base(0x22, 0x3, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r1, &(0x7f0000000000), 0x3) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r1, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[], 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001c00000000000000000000000000000100008000000000000000000000000000000000000000000000000000ea6e00000023000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000006c29c2109fa0385238983d678000000000456126d6d2411ff61c56cfc45067173e8292629dc33874a024525c3eb99d28e1dcf2d9cf2c28a9b3c390fdd50942f93618138012670b0de7d7a2f9f05a64998c058a99b58bf36934944207000000731addeeccaf0407715871fac0a8f7e82b3e6ac4f243f03ea7db1109cc1b6a0a262c7570ab6cf50c0f41bf147c97b61f312fd97605102e5fb6d3c16599aeada399ffa34bc49fff5d0718c28f3f4085bea5efebabebb27628694408e96608b4ed28c1d84594ba77b94254f18b7e000000000000537f75b86b79a7b0b43d01d9ca56d4fe3587c8172030e650c35e23ce8dae57fc9f6065f753584b022671d3e17bbf78c31bfea1d6"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 352.381152][T18504] FAT-fs (loop3): bogus number of reserved sectors [ 352.419892][T18504] FAT-fs (loop3): Can't find a valid FAT filesystem 15:33:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[], 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:56 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045003, 0x0) 15:33:56 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x312, 0x6, 0x9, 0x80000000, 0x0, @dev={[], 0x18}}, 0x10) 15:33:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[], 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:57 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1'}, 0x4) write$P9_RLOPEN(r0, &(0x7f00000000c0)={0x18}, 0x18) [ 353.114397][T18555] debugfs: Directory 'loop0' with parent 'block' already present! 15:33:57 executing program 0: 15:33:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) [ 353.203101][T18571] FAT-fs (loop3): bogus number of reserved sectors 15:33:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 353.272341][T18571] FAT-fs (loop3): Can't find a valid FAT filesystem 15:33:57 executing program 0: 15:33:57 executing program 0: 15:33:57 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x80000) read$rfkill(r0, &(0x7f0000000040), 0xfffffffffffffcd5) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:58 executing program 0: 15:33:58 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f00000000c0)='/dev/dsp#\x00', &(0x7f0000000180)='/dev/dsp#\x00', 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r1, &(0x7f0000000000), 0x3) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r1, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:58 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:58 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) [ 354.116887][T18628] FAT-fs (loop3): bogus number of reserved sectors [ 354.134925][T18628] FAT-fs (loop3): Can't find a valid FAT filesystem 15:33:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:58 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) [ 354.539024][T10000] debugfs: Directory 'loop0' with parent 'block' already present! 15:33:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00\x00'], 0x3) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:59 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:59 executing program 2: read$rfkill(0xffffffffffffffff, &(0x7f0000000000), 0x3) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x4002, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f00000000c0)={r1, 0x80000, r0}) ioctl$int_in(0xffffffffffffffff, 0x800000c0045009, &(0x7f0000000100)=0x3) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000012c0), 0x4) ioctl$int_in(0xffffffffffffffff, 0x800060c0045005, &(0x7f0000000140)=0x5ad) write$UHID_CREATE(r0, &(0x7f0000001180)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000180)=""/4096, 0x1000, 0x89e, 0x10001, 0x3, 0x0, 0x8001}, 0x120) 15:33:59 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x28003, 0x100) read$rfkill(r0, &(0x7f0000000180), 0xfffffffffffffff8) r1 = getpgid(0x0) ptrace$peekuser(0x3, r1, 0xffffffffffffff7f) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:59 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 355.003656][T18685] FAT-fs (loop3): bogus number of reserved sectors [ 355.030664][T18685] FAT-fs (loop3): Can't find a valid FAT filesystem 15:33:59 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:33:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00\x00'], 0x3) truncate(&(0x7f0000000240)='./bus\x00', 0x1) [ 355.241390][T18702] debugfs: Directory 'loop0' with parent 'block' already present! 15:33:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:33:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:33:59 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:33:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:33:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:34:00 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) [ 355.833134][T18728] debugfs: File 'dropped' in directory 'loop0' already present! [ 355.868743][T18728] debugfs: File 'msg' in directory 'loop0' already present! 15:34:00 executing program 2: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) 15:34:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) [ 355.883465][T18728] debugfs: File 'trace0' in directory 'loop0' already present! [ 355.905492][T18735] FAT-fs (loop3): bogus number of reserved sectors [ 355.924926][T18735] FAT-fs (loop3): Can't find a valid FAT filesystem 15:34:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:34:00 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:34:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) [ 356.137726][T18760] debugfs: File 'dropped' in directory 'loop0' already present! [ 356.157616][T18760] debugfs: File 'msg' in directory 'loop0' already present! [ 356.165669][T18760] debugfs: File 'trace0' in directory 'loop0' already present! [ 356.276734][T18767] debugfs: File 'dropped' in directory 'loop0' already present! [ 356.289385][T18767] debugfs: File 'msg' in directory 'loop0' already present! [ 356.303401][T18767] debugfs: File 'trace0' in directory 'loop0' already present! 15:34:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:34:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00'], 0x2) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:34:00 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:34:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:34:00 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000180), 0xfffffee4) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:34:00 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) [ 356.727524][T18788] debugfs: File 'dropped' in directory 'loop0' already present! [ 356.756249][T18788] debugfs: File 'msg' in directory 'loop0' already present! 15:34:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./bus\x00', 0x1) [ 356.790517][T18788] debugfs: File 'trace0' in directory 'loop0' already present! [ 356.795838][T18795] FAT-fs (loop3): bogus number of reserved sectors [ 356.809727][T18795] FAT-fs (loop3): Can't find a valid FAT filesystem 15:34:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001c00000000000000000000000000000100008000000000000000000000000000000000000000000000000000ea6e00000023000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000006c29c2109fa0385238983d678000000000456126d6d2411ff61c56cfc45067173e8292629dc33874a024525c3eb99d28e1dcf2d9cf2c28a9b3c390fdd50942f93618138012670b0de7d7a2f9f05a64998c058a99b58bf36934944207000000731addeeccaf0407715871fac0a8f7e82b3e6ac4f243f03ea7db1109cc1b6a0a262c7570ab6cf50c0f41bf147c97b61f312fd97605102e5fb6d3c16599aeada399ffa34bc49fff5d0718c28f3f4085bea5efebabebb27628694408e96608b4ed28c1d84594ba77b94254f18b7e000000000000537f75b86b79a7b0b43d01d9ca56d4fe3587c8172030"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:34:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:01 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:34:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:34:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:01 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:34:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) [ 357.627829][T18843] debugfs: File 'dropped' in directory 'loop0' already present! [ 357.637485][T18843] debugfs: File 'msg' in directory 'loop0' already present! [ 357.645198][T18843] debugfs: File 'trace0' in directory 'loop0' already present! 15:34:01 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:tmp_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5'}, 0x55) 15:34:01 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) [ 357.684085][T18852] FAT-fs (loop3): bogus number of reserved sectors [ 357.720425][T18852] FAT-fs (loop3): Can't find a valid FAT filesystem 15:34:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) 15:34:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:34:02 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) [ 357.987489][T18871] debugfs: Directory 'loop0' with parent 'block' already present! 15:34:02 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:34:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(0x0, 0x1) 15:34:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:02 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:34:02 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x100, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) r1 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) chown(&(0x7f00000000c0)='./file0\x00', r1, r2) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:34:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(0x0, 0x1) 15:34:02 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) [ 358.615050][T18915] FAT-fs (loop3): bogus number of reserved sectors [ 358.634747][T18915] FAT-fs (loop3): Can't find a valid FAT filesystem 15:34:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 358.816244][T18929] debugfs: File 'dropped' in directory 'loop0' already present! [ 358.846709][T18929] debugfs: File 'msg' in directory 'loop0' already present! 15:34:03 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) [ 358.860430][T18929] debugfs: File 'trace0' in directory 'loop0' already present! 15:34:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) [ 359.097581][T18945] debugfs: Directory 'loop0' with parent 'block' already present! 15:34:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:34:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(0x0, 0x1) 15:34:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:34:03 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:03 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x28001, 0x44000) read$rfkill(r0, &(0x7f0000000080), 0x8) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:34:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(0x0, 0x1) 15:34:03 executing program 2: r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x111000, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x3, 0x2, 0x5, 0xfffffffffffffffc, 0x0, 0x750c, 0x10, 0x5, 0x7ff, 0x6, 0x640, 0x9, 0x8, 0xfff, 0xffffffff, 0x8, 0x8d, 0x7, 0x4, 0x0, 0x9, 0x2, 0x6, 0x1, 0x2, 0x1, 0xc1, 0x5a, 0x401, 0x3, 0xffffffffffffffff, 0x7, 0xe3d, 0x7, 0x5213044d, 0x8001, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000300), 0x2}, 0x1, 0x0, 0xffffffffffffffff, 0xc93115eadc100bd5, 0x100, 0x7, 0xe77}, r0, 0xffffffffffffffff, r1, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r2, &(0x7f0000000000), 0x3) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000100)=0x3) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20804}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xd8, r3, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x18, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x25}}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7ff}, @IPVS_CMD_ATTR_DEST={0x54, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7ff}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xb3ac}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xffffffffffffffe0}, @IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e21}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x83f}]}, 0xd8}}, 0x4000004) ioctl$int_in(r2, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:34:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(0x0, 0x1) 15:34:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:34:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./bus\x00', 0x0) [ 359.594214][T18964] FAT-fs (loop3): bogus number of reserved sectors 15:34:03 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) [ 359.672400][T18964] FAT-fs (loop3): Can't find a valid FAT filesystem 15:34:03 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:04 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./bus\x00', 0x0) 15:34:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001c00000000000000000000000000000100008000000000000000000000000000000000000000000000000000ea6e00000023000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000006c29c2109fa0385238983d678000000000456126d6d2411ff61c56cfc45067173e8292629dc33874a024525c3eb99d28e1dcf2d9cf2c28a9b3c390fdd50942f93618138012670b0de7d7a2f9f05a64998c058a99b58bf36934944207000000731addeeccaf0407715871fac0a8f7e82b3e6ac4f243f03ea7db1109cc1b6a0a262c7570ab6cf50c0f41bf147c97b61f312fd97605102e5fb6d3c16599aeada399ffa34bc49fff5d0718c28f3f4085bea5efebabebb27628694408e96608b4ed28c1d84594ba77b94254f18b7e000000000000537f75b86b79a7b0b43d01d9ca56d4"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:34:04 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:34:04 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000000c0)) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000200)={0x0, 0x4, 0x0, [{0x2, 0xfff, 0x600, 0x7, 0xbd, 0x3ff, 0x1f}, {0x5, 0x4, 0xdc, 0x3, 0x9, 0x7b7, 0x6}, {0x1, 0xff, 0x0, 0x6, 0x1f, 0x2, 0x858a}, {0x5, 0x2, 0x80000000, 0x3ff, 0xff, 0xb97, 0x2}]}) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x2, 0x8000, 0x3f, 0x0, 0x8, 0x10000, 0xc, 0x6, 0x6, 0x40, 0x6, 0xf2, 0x4, 0xa4d6, 0xfffffffffffffffd, 0x3, 0x0, 0x8, 0x8, 0x0, 0x3, 0x4, 0x5, 0x7, 0x8853, 0x0, 0x4d92, 0x6, 0x5, 0x3f, 0x7, 0x9, 0x3, 0x0, 0x8, 0x0, 0x2, 0x0, @perf_config_ext={0x10000, 0x1a2}, 0x40, 0x3f, 0x154, 0x3, 0x400, 0x5, 0x10000}, r1, 0x0, 0xffffffffffffffff, 0x2) 15:34:04 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:04 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./bus\x00', 0x0) 15:34:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 360.469252][T19023] FAT-fs (loop3): bogus number of reserved sectors [ 360.488726][T19023] FAT-fs (loop3): Can't find a valid FAT filesystem 15:34:04 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) [ 360.519323][T19032] debugfs: Directory 'loop0' with parent 'block' already present! 15:34:04 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:04 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 15:34:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./bus\x00', 0x0) 15:34:04 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:34:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:34:05 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 15:34:05 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, 0x0, &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:05 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0x6}, 0x8, 0x0) write$binfmt_misc(r0, &(0x7f0000000300)={'sy\xef\x91', "09d4bb1c29a75869d98d3703fb07c854df75045f82876ab8227ac258967e639f1b56e49a3e0de2f83d304d1782de5317e664eb9929c95681968150a1216d1abf4d15f346203b2c52ce148dc6b55c60701871da3af316bf2327052adec112f2e0209766dbce556a167a54ba9fd8d90ae36aca9565a9"}, 0x79) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) flistxattr(r1, &(0x7f0000000180)=""/224, 0xe0) read$rfkill(r1, &(0x7f0000000000), 0x3) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r1, 0x800060c0045005, &(0x7f0000000140)=0x5ad) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f00000000c0)) 15:34:05 executing program 4: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001c00000000000000000000000000000100008000000000000000000000000000000000000000000000000000ea6e00000023000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000006c29c2109fa0385238983d678000000000456126d6d2411ff61c56cfc45067173e8292629dc33874a024525c3eb99d28e1dcf2d9cf2c28a9b3c390fdd50942f93618138012670b0de7d7a2f9f05a64998c058a99b58bf36934944207000000731addeeccaf0407715871fac0a8f7e82b3e6ac4f243f03ea7db1109cc1b6a0a262c7570ab6cf50c0f41bf147c97b61f312fd97605102e5fb6d3c16599aeada399ffa34bc49fff5d0718c28f3f4085bea5efebabebb27628694408e96608b4ed28c1d84594ba77b94254f18b7e000000000000537f75b86b79a7b0b4"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:34:05 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 361.301773][T19082] debugfs: Directory 'loop0' with parent 'block' already present! 15:34:05 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, 0x0, &(0x7f0000000080)='configfs\x00', 0x0, 0x0) [ 361.402110][T19094] FAT-fs (loop3): bogus number of reserved sectors [ 361.408718][T19094] FAT-fs (loop3): Can't find a valid FAT filesystem 15:34:05 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 15:34:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:34:05 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 361.576105][T19110] debugfs: Directory 'loop0' with parent 'block' already present! [ 361.869322][T19124] debugfs: Directory 'loop0' with parent 'block' already present! 15:34:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:34:06 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) 15:34:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:34:06 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 15:34:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:34:06 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000040), 0x8) read$rfkill(r0, &(0x7f0000000000), 0x3) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x8000, 0x4) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000100)=0x3) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x78, r2, 0x20, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x10000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x31}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3b}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x18}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x71}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x40000}, 0x10) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x5ad) 15:34:06 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) [ 362.247691][T19136] debugfs: File 'dropped' in directory 'loop0' already present! [ 362.285740][T19144] FAT-fs (loop3): bogus number of reserved sectors 15:34:06 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 15:34:06 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) [ 362.294089][T19136] debugfs: File 'msg' in directory 'loop0' already present! 15:34:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 362.324032][T19144] FAT-fs (loop3): Can't find a valid FAT filesystem [ 362.331017][T19136] debugfs: File 'trace0' in directory 'loop0' already present! 15:34:06 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 362.439937][T19164] debugfs: File 'dropped' in directory 'loop0' already present! [ 362.459276][T19164] debugfs: File 'msg' in directory 'loop0' already present! 15:34:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) [ 362.490533][T19164] debugfs: File 'trace0' in directory 'loop0' already present! [ 362.604721][T19173] debugfs: File 'dropped' in directory 'loop0' already present! [ 362.612708][T19173] debugfs: File 'msg' in directory 'loop0' already present! [ 362.620480][T19173] debugfs: File 'trace0' in directory 'loop0' already present! 15:34:07 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 15:34:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:34:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:34:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r0}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:34:07 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000200)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000300)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000340)=0x18) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000380)={r1, 0x3, 0x12, "9099da1b0ecb0a68ffa4de731a0c78522d37"}, 0x1a) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r2, &(0x7f0000000000), 0x8) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000100)=0x3) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x5ad) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) read$rfkill(r2, &(0x7f00000000c0), 0x8) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x1c, r3, 0x100, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) 15:34:07 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 363.091109][T19187] debugfs: File 'dropped' in directory 'loop0' already present! [ 363.115757][T19187] debugfs: File 'msg' in directory 'loop0' already present! [ 363.130381][T19187] debugfs: File 'trace0' in directory 'loop0' already present! 15:34:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r0}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) [ 363.148762][T19193] FAT-fs (loop3): bogus number of reserved sectors [ 363.168547][T19193] FAT-fs (loop3): Can't find a valid FAT filesystem 15:34:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001c00000000000000000000000000000100008000000000000000000000000000000000000000000000000000ea6e00000023000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000006c29c2109fa0385238983d678000000000456126d6d2411ff61c56cfc45067173e8292629dc33874a024525c3eb99d28e1dcf2d9cf2c28a9b3c390fdd50942f93618138012670b0de7d7a2f9f05a64998c058a99b58bf36934944207000000731addeeccaf0407715871fac0a8f7e82b3e6ac4f243f03ea7db1109cc1b6a0a262c7570ab6cf50c0f41bf147c97b61f312fd97605102e5fb6d3c16599aeada399ffa34bc49fff5d0718c28f3f4085bea5efebabebb27628694408e96608b4ed28c1d84594ba77b94254f18b7e000000000000537f75b86b79a7"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:34:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:34:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r0}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000240)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:07 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) [ 363.415754][T19220] debugfs: File 'dropped' in directory 'loop0' already present! [ 363.430709][T19220] debugfs: File 'msg' in directory 'loop0' already present! 15:34:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 15:34:07 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) [ 363.470984][T19220] debugfs: File 'trace0' in directory 'loop0' already present! 15:34:07 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002340)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) 15:34:07 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) [ 363.581563][T19231] debugfs: File 'dropped' in directory 'loop0' already present! [ 363.636733][T19231] debugfs: File 'msg' in directory 'loop0' already present! [ 363.679876][T19231] debugfs: File 'trace0' in directory 'loop0' already present! 15:34:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e100aa"], 0x6) truncate(&(0x7f0000000240)='./bus\x00', 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 15:34:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001c00000000000000000000000000000100008000000000000000000000000000000000000000000000000000ea6e00000023000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000006c29c2109fa0385238983d678000000000456126d6d2411ff61c56cfc45067173e8292629dc33874a024525c3eb99d28e1dcf2d9cf2c28a9b3c390fdd50942f93618138012670b0de7d7a2f9f05a64998c058a99b58bf36934944207000000731addeeccaf0407715871fac0a8f7e82b3e6ac4f243f03ea7db1109cc1b6a0a262c7570ab6cf50c0f41bf147c97b61f312fd97605102e5fb6d3c16599aeada399ffa34bc49fff5d0718c28f3f4085bea5efebabebb27628694408e96608b4ed28c1d84594ba77b94254f18b7e000000000000537f75b8"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:34:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:08 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 15:34:08 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x3) ioctl$int_in(r0, 0x5473, &(0x7f0000000180)) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x1, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000140)=0x2) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000040)) ioctl$VIDIOC_ENCODER_CMD(r0, 0xc028564d, &(0x7f00000000c0)={0x2, 0x1, [0x0, 0x6, 0x1, 0x6, 0x42, 0xe4e, 0x1, 0x9897]}) 15:34:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) [ 364.014170][T19254] debugfs: Directory 'loop0' with parent 'block' already present! 15:34:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) 15:34:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="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"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 15:34:08 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 364.095217][T19266] FAT-fs (loop3): bogus number of reserved sectors [ 364.105219][T19266] FAT-fs (loop3): Can't find a valid FAT filesystem 15:34:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x1, 0x80002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000980)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000001180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001c00000000000000000000000000000100008000000000000000000000000000000000000000000000000000ea6e00000023000000000000000000000000000000000000000000000000001400000000000000000000000000000000000000000000000000006c29c2109fa0385238983d678000000000456126d6d2411ff61c56cfc45067173e8292629dc33874a024525c3eb99d28e1dcf2d9cf2c28a9b3c390fdd50942f93618138012670b0de7d7a2f9f05a64998c058a99b58bf36934944207000000731addeeccaf0407715871fac0a8f7e82b3e6ac4f243f03ea7db1109cc1b6a0a262c7570ab6cf50c0f41bf147c97b61f312fd97605102e5fb6d3c16599aeada399ffa34bc49fff5d0718c28f3f4085bea5efebabebb27628694408e96608b4ed28c1d84594ba77b94254f18b7e000000000000537f75"], @ANYBLOB="00000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000004aee00000000000000000800000000000000000000000000000000000000000000000000000066c42ebbf78f7b7301b7739eb8adcda3faa97a430c22b51ff0b27add495e68fe402a78400e25bc36b227fc681ee862e1c771787a716922e5e899af4e759c73"], 0x3) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)) r5 = gettid() getpgid(r5) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{0x0}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000080)={[0xb200, 0x0, 0x6c00000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r3, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347c8c6d049c614ba2ee8a14a3585764fb1f23502ae4dbed7b83f72c703b777a937a5bd090b47ff5b50c704b02f4a7bd7dbe16533866bb30fe260d49519c1f1a697c672a531f322c7e12358a0ef2a1a2e3c", 0xac, 0xfffffffffffffff9) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r7, 0x1, &(0x7f0000000c80)=[&(0x7f0000000c40)={0x0, 0x0, 0x0, 0x3, 0x2, r6, &(0x7f0000000900)="fedfcd7afb84ce6c40934a5563fd7fb4ee8ad3414d8d75e3e28251c2", 0x1c, 0xdc3, 0x0, 0x1, r2}]) r8 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r8) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) msgget$private(0x0, 0x150) 15:34:08 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 15:34:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) fcntl$getown(r0, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0x0, 0xa0, 0x80, 0x0, 0x0, r1}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x0, 0xa7, 0x0, 0x4}, {0x8, 0x0, 0x9}, 0x0, 0x6e6bbf, 0x2}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x34ff, 0x3, 0x1, 0x0, 0x7, 0x0, 0xb5}}, 0xe8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x7}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) [ 364.461307][ T3516] ================================================================== [ 364.469394][ T3516] BUG: KASAN: use-after-free in debugfs_remove+0x10d/0x130 [ 364.476593][ T3516] Read of size 8 at addr ffff88808e6a24e0 by task kworker/1:2/3516 [ 364.476597][ T3516] [ 364.476611][ T3516] CPU: 1 PID: 3516 Comm: kworker/1:2 Not tainted 5.3.0-rc4+ #107 [ 364.476618][ T3516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.476634][ T3516] Workqueue: events __blk_release_queue [ 364.486822][ T3516] Call Trace: [ 364.486844][ T3516] dump_stack+0x172/0x1f0 [ 364.486859][ T3516] ? debugfs_remove+0x10d/0x130 [ 364.486875][ T3516] print_address_description.cold+0xd4/0x306 [ 364.486890][ T3516] ? debugfs_remove+0x10d/0x130 [ 364.517792][ T3516] ? debugfs_remove+0x10d/0x130 [ 364.517807][ T3516] __kasan_report.cold+0x1b/0x36 [ 364.517821][ T3516] ? write_comp_data+0x70/0x70 [ 364.517837][ T3516] ? debugfs_remove+0x10d/0x130 [ 364.528609][ T3516] kasan_report+0x12/0x17 [ 364.528624][ T3516] __asan_report_load8_noabort+0x14/0x20 [ 364.528636][ T3516] debugfs_remove+0x10d/0x130 [ 364.528662][ T3516] blk_trace_free+0x38/0x140 [ 364.538315][ T3516] __blk_trace_remove+0x78/0xa0 [ 364.538327][ T3516] blk_trace_shutdown+0x67/0x90 [ 364.538339][ T3516] __blk_release_queue+0x219/0x380 [ 364.538351][ T3516] process_one_work+0x9af/0x1740 [ 364.538367][ T3516] ? pwq_dec_nr_in_flight+0x320/0x320 [ 364.548006][ T3516] ? lock_acquire+0x190/0x410 [ 364.548026][ T3516] worker_thread+0x98/0xe40 [ 364.548036][ T3516] ? trace_hardirqs_on+0x67/0x240 [ 364.548054][ T3516] kthread+0x361/0x430 [ 364.557169][ T3516] ? process_one_work+0x1740/0x1740 [ 364.557183][ T3516] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 364.557197][ T3516] ret_from_fork+0x24/0x30 [ 364.557209][ T3516] [ 364.567453][ T3516] Allocated by task 19254: [ 364.567465][ T3516] save_stack+0x23/0x90 [ 364.567476][ T3516] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 364.567485][ T3516] kasan_slab_alloc+0xf/0x20 [ 364.567499][ T3516] kmem_cache_alloc+0x121/0x710 [ 364.572446][T19292] kobject: 'holders' (000000006f16f1a5): kobject_add_internal: parent: 'loop0', set: '' [ 364.576888][ T3516] __d_alloc+0x2e/0x8c0 [ 364.576898][ T3516] d_alloc+0x4d/0x280 [ 364.576910][ T3516] d_alloc_parallel+0xf4/0x1c30 [ 364.576919][ T3516] __lookup_slow+0x1ab/0x500 [ 364.576933][ T3516] lookup_one_len+0x16d/0x1a0 [ 364.582047][T19292] kobject: 'slaves' (00000000fcd7d9be): kobject_add_internal: parent: 'loop0', set: '' [ 364.586842][ T3516] start_creating+0xc5/0x1d0 [ 364.586852][ T3516] __debugfs_create_file+0x65/0x3c0 [ 364.586879][ T3516] debugfs_create_file+0x5a/0x70 [ 364.586888][ T3516] do_blk_trace_setup+0x361/0xb50 [ 364.586902][ T3516] __blk_trace_setup+0xe3/0x190 [ 364.592104][T19292] kobject: 'loop0' (0000000088a381ff): kobject_uevent_env [ 364.597144][ T3516] blk_trace_ioctl+0x170/0x300 [ 364.597156][ T3516] blkdev_ioctl+0x126/0x1c1a [ 364.597167][ T3516] block_ioctl+0xee/0x130 [ 364.597176][ T3516] do_vfs_ioctl+0xdb6/0x13e0 [ 364.597188][ T3516] ksys_ioctl+0xab/0xd0 [ 364.602149][T19292] kobject: 'loop0' (0000000088a381ff): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 364.606311][ T3516] __x64_sys_ioctl+0x73/0xb0 [ 364.606336][ T3516] do_syscall_64+0xfd/0x6a0 [ 364.606349][ T3516] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 364.606352][ T3516] [ 364.606357][ T3516] Freed by task 17: [ 364.606372][ T3516] save_stack+0x23/0x90 [ 364.611828][T19292] kobject: 'queue' (00000000e8ba769e): kobject_add_internal: parent: 'loop0', set: '' [ 364.615445][ T3516] __kasan_slab_free+0x102/0x150 [ 364.615456][ T3516] kasan_slab_free+0xe/0x10 [ 364.615466][ T3516] kmem_cache_free+0x86/0x320 [ 364.615476][ T3516] __d_free+0x20/0x30 [ 364.615491][ T3516] rcu_core+0x67f/0x1580 [ 364.621225][T19292] kobject: 'mq' (000000002d9003c7): kobject_add_internal: parent: 'loop0', set: '' [ 364.626862][ T3516] rcu_core_si+0x9/0x10 [ 364.626931][ T3516] __do_softirq+0x262/0x98c [ 364.626939][ T3516] [ 364.631661][T19292] kobject: 'mq' (000000002d9003c7): kobject_uevent_env [ 364.633630][ T3516] The buggy address belongs to the object at ffff88808e6a24a0 [ 364.633630][ T3516] which belongs to the cache dentry(87:syz5) of size 288 [ 364.633642][ T3516] The buggy address is located 64 bytes inside of [ 364.633642][ T3516] 288-byte region [ffff88808e6a24a0, ffff88808e6a25c0) [ 364.633646][ T3516] The buggy address belongs to the page: [ 364.633657][ T3516] page:ffffea000239a880 refcount:1 mapcount:0 mapping:ffff8880a7b00000 index:0x0 [ 364.633666][ T3516] flags: 0x1fffc0000000200(slab) [ 364.633685][ T3516] raw: 01fffc0000000200 ffffea0002394c48 ffffea0001550d48 ffff8880a7b00000 [ 364.638153][T19292] kobject: 'mq' (000000002d9003c7): kobject_uevent_env: filter function caused the event to drop! [ 364.642197][ T3516] raw: 0000000000000000 ffff88808e6a2080 000000010000000b 0000000000000000 [ 364.642202][ T3516] page dumped because: kasan: bad access detected [ 364.642205][ T3516] [ 364.642209][ T3516] Memory state around the buggy address: [ 364.642219][ T3516] ffff88808e6a2380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 364.642229][ T3516] ffff88808e6a2400: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 364.642239][ T3516] >ffff88808e6a2480: fc fc fc fc fb fb fb fb fb fb fb fb fb fb fb fb [ 364.642249][ T3516] ^ [ 364.648340][T19292] kobject: '0' (0000000003e83c8a): kobject_add_internal: parent: 'mq', set: '' [ 364.652414][ T3516] ffff88808e6a2500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 364.652424][ T3516] ffff88808e6a2580: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 364.652428][ T3516] ================================================================== [ 364.655268][ T3516] Kernel panic - not syncing: panic_on_warn set ... [ 364.670605][T19292] kobject: 'cpu0' (000000002653d640): kobject_add_internal: parent: '0', set: '' [ 364.671762][ T3516] CPU: 1 PID: 3516 Comm: kworker/1:2 Tainted: G B 5.3.0-rc4+ #107 [ 364.671770][ T3516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.671785][ T3516] Workqueue: events __blk_release_queue [ 364.675850][T19292] kobject: 'cpu1' (00000000a91bf6b1): kobject_add_internal: parent: '0', set: '' [ 364.680566][ T3516] Call Trace: [ 364.680584][ T3516] dump_stack+0x172/0x1f0 [ 364.680600][ T3516] panic+0x2dc/0x755 [ 364.680617][ T3516] ? add_taint.cold+0x16/0x16 [ 364.680634][ T3516] ? debugfs_remove+0x10d/0x130 [ 364.687408][T19292] kobject: 'queue' (00000000e8ba769e): kobject_uevent_env [ 364.689935][ T3516] ? preempt_schedule+0x4b/0x60 [ 364.689951][ T3516] ? ___preempt_schedule+0x16/0x20 [ 364.689964][ T3516] ? trace_hardirqs_on+0x5e/0x240 [ 364.689982][ T3516] ? debugfs_remove+0x10d/0x130 [ 364.700491][T19292] kobject: 'queue' (00000000e8ba769e): kobject_uevent_env: filter function caused the event to drop! [ 364.704745][ T3516] end_report+0x47/0x4f [ 364.704758][ T3516] ? debugfs_remove+0x10d/0x130 [ 364.704770][ T3516] __kasan_report.cold+0xe/0x36 [ 364.704789][ T3516] ? write_comp_data+0x70/0x70 [ 364.710666][T19292] kobject: 'iosched' (00000000a9c9dc98): kobject_add_internal: parent: 'queue', set: '' [ 364.714877][ T3516] ? debugfs_remove+0x10d/0x130 [ 364.714893][ T3516] kasan_report+0x12/0x17 [ 364.714906][ T3516] __asan_report_load8_noabort+0x14/0x20 [ 364.714922][ T3516] debugfs_remove+0x10d/0x130 [ 364.720266][T19292] kobject: 'iosched' (00000000a9c9dc98): kobject_uevent_env [ 364.724731][ T3516] blk_trace_free+0x38/0x140 [ 364.724743][ T3516] __blk_trace_remove+0x78/0xa0 [ 364.724756][ T3516] blk_trace_shutdown+0x67/0x90 [ 364.724774][ T3516] __blk_release_queue+0x219/0x380 [ 364.732119][T19292] kobject: 'iosched' (00000000a9c9dc98): kobject_uevent_env: filter function caused the event to drop! [ 364.736587][ T3516] process_one_work+0x9af/0x1740 [ 364.736606][ T3516] ? pwq_dec_nr_in_flight+0x320/0x320 [ 364.736623][ T3516] ? lock_acquire+0x190/0x410 [ 364.741475][T19292] kobject: 'integrity' (0000000008c881a6): kobject_add_internal: parent: 'loop0', set: '' [ 364.745495][ T3516] worker_thread+0x98/0xe40 [ 364.745507][ T3516] ? trace_hardirqs_on+0x67/0x240 [ 364.745529][ T3516] kthread+0x361/0x430 [ 364.750437][T19292] kobject: 'integrity' (0000000008c881a6): kobject_uevent_env [ 364.754214][ T3516] ? process_one_work+0x1740/0x1740 [ 364.754228][ T3516] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 364.754241][ T3516] ret_from_fork+0x24/0x30 [ 364.765546][ T3516] Kernel Offset: disabled [ 365.266426][ T3516] Rebooting in 86400 seconds..