0xd4, 0x0, 0x0, 0x70bd28, 0x25dfdbfd, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}]}, 0xd4}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x0) [ 632.501654] FAT-fs (loop6): invalid media value (0x00) [ 632.502890] FAT-fs (loop6): Can't find a valid FAT filesystem [ 632.534092] loop1: detected capacity change from 0 to 41948160 01:05:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 632.546581] FAT-fs (loop1): bogus number of reserved sectors [ 632.547318] FAT-fs (loop1): Can't find a valid FAT filesystem 01:05:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 632.562033] loop4: detected capacity change from 0 to 41948160 [ 632.566031] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6037 comm=syz-executor.7 [ 632.572747] loop3: detected capacity change from 0 to 41948160 [ 632.585841] FAT-fs (loop4): bogus number of reserved sectors [ 632.586550] FAT-fs (loop4): Can't find a valid FAT filesystem [ 632.598934] loop5: detected capacity change from 0 to 41948160 01:05:19 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 632.640686] FAT-fs (loop3): invalid media value (0x00) [ 632.641897] FAT-fs (loop3): Can't find a valid FAT filesystem [ 632.657316] FAT-fs (loop5): bogus number of reserved sectors [ 632.658103] FAT-fs (loop5): Can't find a valid FAT filesystem [ 632.690635] loop2: detected capacity change from 0 to 41948160 [ 632.705435] FAT-fs (loop2): bogus number of reserved sectors [ 632.706720] FAT-fs (loop2): Can't find a valid FAT filesystem 01:05:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:05:35 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@afid}]}}) 01:05:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 648.132807] loop2: detected capacity change from 0 to 41948160 01:05:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:05:35 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6e3, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x20) r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000380)) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_freezer_state(r0, &(0x7f0000000040), 0x2, 0x0) copy_file_range(r1, &(0x7f0000000000)=0x10000, r2, 0x0, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r4, 0x0) io_uring_enter(r4, 0x58ab, 0x0, 0x0, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x13, r4, 0x8000000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000340)={[0x50a]}, 0x8) recvmsg$unix(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/11, 0xb}, {&(0x7f0000000100)=""/6, 0x6}], 0x2, &(0x7f0000000480)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000edbd921b0e3c98081a11a674961e36cef2e885e1a382a4e72c73e4d8ed6944d0151d94c790beaef28e155a1db0a9c8a53001f303613d2700e63181f465a4e63babb705293d59fc9d832f803c6bc8a12d4aebcc91eafdc673e38d94c8897ad1e4179a543c4e5c91be4a1c987bb9e2a7b4a17641195cf48d214ebc14e4130bd86063a48a4aba4cee0800c6e8dd05276382e00871e962dcad03acc89f95c9d7146cb2cee69f4333322dbd131f39a9003d6e08d53fdc12921e2721696e7aaff3e322d7242fe9e465367d608d639049fa513b97276fb449d94453ca05ec055840234791e50710b9028cfd1f5f628978413a0a361c23aefc58479308570ee7d7448ef4fba15b1ea2b8fc3a778241c3327e754d51d367ec4fb6c4949e3f7a156789f15c51015d4bf80910e30ed878598cc871fa5e9d74a4636db7c478cd47fef25aa1d70d5114c3bf3822350380931315bcb45c3698ba40bd1049a83a0135c259b82e5b2b869970ef0abdf8f3c6a67fea32aa148736e121aaf3a20042ef7168a45d383fd3eea0cd5dfa", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000002400000000000000010000000100000064be4a32b94e3f89769eab9a83a8469581ed92736c7933d0b01d809f8ec8e3d1de32e815d6294a10b3b04559c6fff5023995f2e39996f8a14f8302ab5092625d0fa41670d5664ae64e6a93d13b81931fb8ff", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xe0}, 0x10160) io_uring_enter(r5, 0x203b, 0xe583, 0x0, &(0x7f0000000280), 0x8) 01:05:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:05:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:05:35 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 648.151181] loop1: detected capacity change from 0 to 41948160 [ 648.162029] loop3: detected capacity change from 0 to 41948160 [ 648.169582] loop6: detected capacity change from 0 to 41948160 [ 648.176722] FAT-fs (loop2): bogus number of reserved sectors [ 648.178100] FAT-fs (loop2): Can't find a valid FAT filesystem [ 648.194261] loop5: detected capacity change from 0 to 41948160 [ 648.197715] FAT-fs (loop5): invalid media value (0x00) [ 648.198394] FAT-fs (loop5): Can't find a valid FAT filesystem [ 648.201369] FAT-fs (loop1): bogus number of reserved sectors [ 648.202148] FAT-fs (loop1): Can't find a valid FAT filesystem [ 648.209335] FAT-fs (loop3): invalid media value (0x00) [ 648.210847] FAT-fs (loop3): Can't find a valid FAT filesystem [ 648.213091] loop4: detected capacity change from 0 to 41948160 [ 648.221179] FAT-fs (loop6): invalid media value (0x00) [ 648.222367] FAT-fs (loop6): Can't find a valid FAT filesystem 01:05:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:05:35 executing program 7: sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x280800, 0x160) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3ff, 0x400) openat2(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x100, 0x8, 0x18}, 0x18) sendmsg$nl_generic(r0, 0x0, 0x40001) sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0x4c, 0x0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x6}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x80000001}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x40040c0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x80d00, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000200)={0xd8, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@nested={0xc, 0x11, 0x0, 0x1, [@typed={0x7, 0x76, 0x0, 0x0, @str='\xf3+\x00'}]}, @generic="2ef9b9d79bb827e8b023d973f9a9b317430606a5eb854dcf902b63643a28dfea2b84efeeb6dd5765d40299ce6e50190d9408877186bdf575b0c6c65b685d75e818361d6b1d17e3cf85df0b3de40dc1ec6c27fdc611b63c9c9d1c566dd4d417a0d86a6b907220885899fea9320188a414523d893995ae45cdc0276ce695fd4969066c7fe9dbabe7b9f1185eaa5447775b2f81f9484dc04a388b73b9313d8395bb5588a2d2d59aaee6064f9ea0235eebdd073e56f754222c96"]}, 0xd8}}, 0x0) [ 648.266488] FAT-fs (loop4): bogus number of reserved sectors [ 648.267827] FAT-fs (loop4): Can't find a valid FAT filesystem [ 648.304142] netlink: 184 bytes leftover after parsing attributes in process `syz-executor.7'. 01:05:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:05:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:05:35 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug}, {@afid}]}}) 01:05:35 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:05:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 648.376690] loop5: detected capacity change from 0 to 41948160 01:05:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 648.400251] FAT-fs (loop5): invalid media value (0x00) [ 648.400995] FAT-fs (loop5): Can't find a valid FAT filesystem [ 648.413379] loop3: detected capacity change from 0 to 41948160 [ 648.428378] loop6: detected capacity change from 0 to 41948160 [ 648.445706] FAT-fs (loop3): invalid media value (0x00) [ 648.446855] FAT-fs (loop3): Can't find a valid FAT filesystem [ 648.453461] FAT-fs (loop6): invalid media value (0x00) [ 648.454195] FAT-fs (loop6): Can't find a valid FAT filesystem [ 648.454789] netlink: 184 bytes leftover after parsing attributes in process `syz-executor.7'. 01:05:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:05:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:05:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:05:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:05:35 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug}, {@afid}]}}) 01:05:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 648.553154] loop4: detected capacity change from 0 to 41948160 01:05:35 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 648.593456] FAT-fs (loop4): invalid media value (0x00) [ 648.594517] FAT-fs (loop4): Can't find a valid FAT filesystem [ 648.631073] loop5: detected capacity change from 0 to 41948160 [ 648.653299] FAT-fs (loop5): invalid media value (0x00) [ 648.654048] FAT-fs (loop5): Can't find a valid FAT filesystem 01:05:50 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug}, {@afid}]}}) 01:05:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:05:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:05:50 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r1 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000000)={@local, r2}, 0x14) stat(&(0x7f0000000400)='mnt/encrypted_dir\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) setresuid(0xffffffffffffffff, r3, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = openat(0xffffffffffffffff, &(0x7f0000000340)='./file1\x00', 0x100, 0x2) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYRES32=r2, @ANYBLOB="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"]}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000300)={'erspan0\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x80, 0x7800, 0xd3e, 0x7, {{0x2c, 0x4, 0x3, 0x5, 0xb0, 0x67, 0x0, 0x0, 0x2f, 0x0, @multicast1, @multicast1, {[@lsrr={0x83, 0x1f, 0x6b, [@initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @broadcast, @local, @remote, @multicast2, @local]}, @timestamp_prespec={0x44, 0x34, 0xff, 0x3, 0xd, [{@broadcast, 0x800}, {@rand_addr=0x64010101, 0x7ff}, {@local, 0x10001}, {@empty, 0x1f}, {@empty, 0x5}, {@multicast1, 0x7}]}, @ra={0x94, 0x4}, @timestamp={0x44, 0x14, 0x5c, 0x0, 0x6, [0x25, 0x7, 0x6, 0x9]}, @timestamp_addr={0x44, 0xc, 0xe5, 0x1, 0x5, [{@local, 0x79d2}]}, @ssrr={0x89, 0x1f, 0x96, [@loopback, @multicast1, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x32}, @local]}, @ra={0x94, 0x4}]}}}}}) 01:05:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:05:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:05:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:05:50 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 663.876745] loop5: detected capacity change from 0 to 41948160 [ 663.896312] loop4: detected capacity change from 0 to 41948160 [ 663.901786] loop3: detected capacity change from 0 to 41948160 [ 663.915204] loop1: detected capacity change from 0 to 41948160 [ 663.927269] loop2: detected capacity change from 0 to 41948160 [ 663.933816] FAT-fs (loop5): invalid media value (0x00) [ 663.935761] FAT-fs (loop5): Can't find a valid FAT filesystem [ 663.940103] loop6: detected capacity change from 0 to 41948160 [ 663.948990] FAT-fs (loop4): invalid media value (0x00) [ 663.951265] FAT-fs (loop4): Can't find a valid FAT filesystem [ 663.953660] FAT-fs (loop3): invalid media value (0x00) [ 663.955776] FAT-fs (loop3): Can't find a valid FAT filesystem [ 663.969815] FAT-fs (loop6): bogus number of FAT sectors [ 663.972114] FAT-fs (loop6): Can't find a valid FAT filesystem [ 663.988868] FAT-fs (loop1): invalid media value (0x00) [ 663.990826] FAT-fs (loop1): Can't find a valid FAT filesystem [ 663.993594] FAT-fs (loop2): bogus number of reserved sectors [ 663.995487] FAT-fs (loop2): Can't find a valid FAT filesystem 01:06:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:08 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:08 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:08 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0xffff) bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000000), 0x4) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001280)={&(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0, 0x7f, 0x5, 0x1000}, {0x5, 0x0, 0x1, 0x3}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000740)) r6 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r9 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r6, 0x0) syz_io_uring_submit(r9, r8, &(0x7f0000000100)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd_index}, 0x8001) r10 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r11, r12, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) r13 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r10, 0x0) syz_io_uring_submit(r13, r12, &(0x7f0000000100)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd_index}, 0x8001) sendmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000340)=[{&(0x7f0000002e00)="c1d8e2ed8b408cfdcf21d1655431e6e54d63cfc29617f450ffa2f027fe7e8f1ee959722dbd128c546c51cd58bc65ae2339cd1be8885cc7f02a2bad85f0cd0ba48eac7c9ecb4ad6cad2009b5182de6c3ef8ce834fa86990bc110c382998f224b21af7638a4dfb90125be5ff7dab72fb8c5b2bc156b635466213bc064531918f0fb65247606f89b762a96c6097ac78435545e6084456deba7dabca288388a3d0a01a9c4cc5110af9c4b5197097da2d73ecc6f8b2dc0bb46613587babadfef490da90bcc52ee4026758c6b3b8783d85c1d9f42d384bc6dde2e706f5a35ed6a00b8d9fe814e1b42920a4930d02e4cb72b6fe2d5d5c16fdbae39bfb8799cb91ab6ce436ef0180ceecf7017eca1d91ea2b5980b24716d6e5293b2d300e1540319d6a006ec3ac02070cf2f7aa79298cde00ded8c098dcd9580e4aeacc7f72bc301adc88f9eaa022f71211ce36e66ce530112696f7630f5cb04bc7b517f9c68622c8d8644b049de797da7e1cf0a9a232146bb83d58fbe8474866db0b7407d8d1b04067e92bccc5c21bbcc034b92edabda81a1a9dba869165dc1688f3eb245c677c3ece03217f3ad604dfa0598ddeef8f7ad296f56893d1289f1221133ec63a9d5edbbc75d7741c761c6e5f00496dce1a2103bf5c55fa60892fa958baa300d3521be1ba7687219fd7e85270b8170c590a1ef14a4637768dbf3f77a2f68dfd6a65bb2460e66b5bcc6e18b0103a2a20b300097915546c412d45c29b2624c18c5e9bf8db7ec9b42d8978aaa7cd43010878cc600d0a651e5345ee5c36dc21f897ae4f60ad22ae590d98e3aba1280525e144817fe4787b3747a5f648ec5e30cb6efbed48a078e76eda519b9d3d4896d6e95e1ab708ae26c81ac634fe8c2a7ebfe1d1a0b0a48aa196ca29a65ad5bb485d416094375f63a1b646b44d1fe3acea6066b3ca8bb3bea84a36245db0b3e15bf38676df45e97dc6d1a5cee23f949cb266c60787829e85b0eccc1d1e232f247df83e43e610596717a098cad2ab63d072bd50b2ffabb11276ae9d5acf12e70c0226049780ca5f37005d8f65f5b6a2d01c833f90e2aeee9164e3833b9fca393c570ffe9545922e1027df1e38d8237fc369b6d6cdb2f59a54a6103170114829f3ecd77a049c20b9b573f7ec7850558d8fd438a4664f6c6c9aa94e3334fa177cda6f2efb7c79c216ab500cb524969d8e3c238cbeacd52debc8ae6b38c773e340eedcfbe900e618a1212b2e85b136c4d86b79a4eb298fb822081ce9741dce41f083d5f7e86dafa18f7c4b3973a482b5a4c088c8d0fe90af13e75c8b5668ab5f30b2e2d1cc4ce4dcb14ab60c5993d5a87768f954b90d98a81e4ec8cb6f8c66bcbeb18c5c08f81bf33adbddacd5146585ff3a9984d110f426774392e4655be68e6c9789a1970d5a19c54ecdfc400237e69bdaf826836b14bf9962587f97656ad457fc5efa72cf0ab545e3f9f7b4acdab1ec4c7a1d4a9cf4204ea3e89bfb945447827f0dd684f0efb5b5f6a9a070baa0bba0e497ecabcc207edb303c9497c460a3c646a6e092ae8440b7b3d220dcf27472b972686d9960389e22fd16abd9243c46aec9674340bfb54f423f35f0987e890f0964b0685a84f8c2976bd559b8fd5cdd921b6c811db88a9dc28826702f6279041d127c6da538cd5cc43ed658d1574f23ddaae5690c517d74278f1fa4314db198be617d50ccb994855599b9905df43012f00d3ee2b3d4c4a0564416e391a48af3e73d706d2da9a9bf7ddb72a8d67c6e3b404798dae46647538918fad899b37ac93a56f8ef5462990ed86e9803219db2eac8f6cd7f9c63b1fe3c6034fd4e7aa5ff700a622402fa51a83af6d0c615d3cf0ad66945b96130ac4d8866448066cd3fb717f53d5e89849ca0c82ba447fb3fcd87c8a20b9c842b9780b5dc8eccfa8c7b0373e2c9e671745d72d21c96565b7bbdaeae11826603def366af4adc34e3b147bc09177f3d11f2b550a3e8506661aac6b303f63b2a6df6a5b2770b63c1d10953e96c675410e76d24f6386cd65aa52979f5df8d4177e91ffae408144a8c7c67f5dd600137a415e17e683dd6fa576ba530f1869a5c6750b2d236a681c73e4293b8097d69b22a0b438de6a9722d8a005fe57b77bc3559dbdd4a383cc814e64c583113fbc80f68d975155b3be6a451414412aa7b1d28c43b393e4a598e7bf297f6452952c14a878c350bcf4c052ba48ab53663b0fd666b1d1ded8b8418a2a5da7a58ce446fed16c9555723911a4baadb4c5bab4fa096d46ce39d61ef9528e44932266861c0c98e0799eb31e20d5c26326461d3ffd1dd3cb57b29a255cc144b02362da9fa292fcd02f7ff420a97e6d8c938f8ca3b17ee042e00a76b464d88c021016567979ae3e7f78e7481e3b49ffa8632ac19301348e6bf6caddca90a8cb34d1a9c336847fbdad821bd1de11fc023b0b9ada3a7c7457764cb31c0a872c793d6f5b43a553703b6eb49746aa27bda803b9e714b25eaebd0e395e04f6fd0e35ced7964038df429da91a83a0e761321e63d9c7c0fbde1311bb956ea3deb5a8ad59ef2ddd10bf96df47ed0be94e3121fd9e6c709353791a3fd5b50d5611463e8bd4814a81ea1216b9414c6dd6b67f6c0792248b69816dd4ad27c11a8e03c8bf3e45d551596024790eb3605f276d088994981fb1dee5e2f3f65f1b9982791170baaa0d763d2dd62f6df36072363982692291ed14003123fe390fdaf4587a94f174ca508f010c078757788caa16f97eb948300ef882d09a23668138f0e295d72809987013520fcfaf9b95b1ddf80f84060e82f0ac84a44eaaefeb9cb886c67be54a4d5f875b7bb2705566a191bd5a9f8d9283d9ca9b730916170ad91fcec75053dac898e88deb279fad33d088c18bc462a8986676f4390ce6b13f98c8c4223c19f9e4e327adc10f48547fd38bf2713e6b2f67bcfe4646b6860bea750066516ab51616d9fd1879feabcae40e8377fd442eee81c2e9020dbd67a46715fff1a347bdc0dd2535cb16125452348916de4c7e0dc3529700091b32a0ccc25754f4b054c7a3040c72570afa9b6cc9bfc89e42dbdbb965fd73b14cf44ce13fd2493a87b3bcb6ca476a085730056ade654d2d6a2f4f9f39801b43fb1574de15b262c9105bfd0deb62758eaeed3313e01fec1f137b998b3fee8d435f2d936ae3484bf354c0c8b621f5cb4c37473b7b1f6b90d92034e961ddccec3b1cfa92b34571185622331b9fb29a3044052147859fe2112e0a11400c4df36a8b8f1fa60ba3febe4362348f977a3229ad88b8ca94434b7aa6e62e3e44f57fcd621a4556cea122ff9689ada7a88ec2f09399b6e1e4c081cbba8e1f02b8d00deeaf6718bba9f442138a74fb79fdb6281311d1405b10ceeab6e762d55621aa94e6219939341ff7a32ce593e52b67b2707410c8a211f8a9ce40a335e242561f84afd5d0252a7111c705d9d48157a04aa08f5dc353ad8e2dadb8ffa9f3cb5eeb55a0fb662bdd3d2be8f350e6296d95649ae97b787414284e74d9dfd199e0952d9d315b7192d3923f7992653084364388a62bab298e8b96db658e8585bde36a9345f60c6035704b5603b40b6e21a9a3b26cdde832a4521b4fef9811c4db7b5baebb2d10de3897c8be80d4b705221ae87c51556a4b3ebb3bbd71e6cdd76833028826c6ddec3398a620fbd23122cb688b948cdb49248aaacd6032e04a2617403b82595e73acbfddfcbdd050930ae1e9db51c88bd9c706c5ef8a7d03af4ed7a402542d2c4c2ec7f18aa997bee9237ccf3b04c232b730e19da3f38395ae240f049314a0c6bad75ebdfc7dba34920deaf869200c9d19c47be01e8fa54f031e036fe97323b28d1b3b0814a42daf6c3767c498741110c70dca8e01b642c73fdee3ecb03c749404ae2930e68f93699a24994ce4919ff44c461cff9d420817e5310c3d9c40fc67789f666fcb79149006493264bda1fd4e5d3c75904ea0a3212e3aadb0d333ddb0d8fda78277cdb2b8a86db1d956be1439cbfe115c77e8aaafe832aebd4ad709a4a497ee99ae73f9754b8ea01e65084362fe1527aea801b1c502660c2d464880b7f833c73de04e8899027d41a6f2d5b29d63a4e4456deedefe6aa45afe27cecc441af97d0269ee48b065d3ce6f1e448dcaa4f4e95c34d6243ea51751c1c4bac2344cfc97a03ed6e31a1f5bdba7935605345071c9437e8e3964b2a110a3c8671ebc04328025d450932fc3fe97f11611863583cd664bc70f6b1502319d896f2d6a42b9f041da75b4e3386b14fa5baf30a0856cb6c011eaa4c046af7c66ef5c693165c461708e116457e1fc6688bc784cc05a3acc4cf49d79221449fa0481401352f8a48909b2bc37940417479843256e1d49294d11dfc0ec97828a424e4706f3ff6fbb6ed1a38bf18b0fd06c68e245f102a4de2313757503f28efaf9720aa1aafe4fd323856304bbc5cd23241fafefa32668ea9c85d28ddfd69a5dedf89d45adf2d37b9c3cbd03feb395f38ccf436a8914368f49a4a8cfdbd50687de16d0e7350b5bb6d88d9f7d30a85551607fdd5651960b58c7a7550071c73d40269c0729eca488d1104fb5f14eeedc7fa49afc0580f2f8730af87fa04164327e9b92aa55333dc2644bcef0f56ebe44388f00d89e315011739b8df5de094a916c6a298d604ff76b5ccb64cc9f94e952448a74d01f69065b3a30418f0dc6b35b0fffd6722fabff5d6565d45198bb188e5ba1cead05613419f66f071b790efec3e30b34487f9a0221f7528df85f545621a7138f32e896f84bb5c86e7ee584197030dca9f52332687b444492eeee999408c83d6e3facaef95b8c48b3d403b7ece3f7d0d4f2d3bd63ff66922efd9030887f080fc75f5b69e7ced18cf8b4a5ae9e9bc8a24a1a2a743dc8ce7de3432cc941108527ec8bd93a97f970ee8735913ef5bacb5d8dc625d7098e4f10059793990ac9ba81dd8eecec7a082dc555bd94d04d4970ca92c2bac1d51de1f01d625df901da164cfab0eed30de2c74d9803d7199d536b9a40d5836075ad1e0b4bccccc11369ed3801cce3758457dd260ee34ac9099c03553e3d473e150a8dba6625ef90e6774997e0ec83a5d1832adba1ab50f3d02acfe93b2dca6fb3fe1a38498cc05c4769e8dd56d379102f7ed8b76468ad1faaf5ae1e02ebac2a0cbcad36468fe33d6605e6c9891241f39ca3479139206810adde02dcceae430f979dd485fb700ba7cbf42b80240a60f1069d3c7861efea27c302c15656ce535ac9933da32074b620be6ef82184801b2d191bfbe1e358572f484c0a07329e36d78a6b1d06519bf156fc28deeafd7d794c4ff42ac4f293677a2358a7a32f233cdfbff5a46a7259ac586640d6300e0d5bdef864679698ed4e32ff99a82d2de1e5ea3ec4cb54ed15348f7eeec3eb77a727296bce74b5605c3e83fe5390794f3ba987fe65681cdc002229a57940ae5143ce3a268815762a167753d35512ec32462fc17845dee9cca70a1f4808a9d0b1c96f2a713789a83e17861afda3c4126ac723707b8c3a4d73f40d8671ef8012ee2244a27536fcfeb54446a68865f5bd4bb8ce315102191be2c1eb80aef98fc179c41f87199e0ceba1648f0a6baf0f5fd893947322fdefca60c14430596a2650893f554b968f5b9c221608cfa0ef4ba226b7c273a86d508ec0d1f1fb2810796836ef3d203306b3d0da5553de4ae409b3ddd12add4ba68649c282c3ffe93b686f028a8d14ae91729d1f18084ae43ee3105a387199a7c6d24ae9c5a69f4384c194b8f72c8de3bfa3529a7e443a3a3a4c51a1ad8", 0x1000}, {&(0x7f00000002c0)="aee7a4d03e5395db8e57e082c1823902c3acdca70d07f631633d3711c159348188822d8880f893de9a21d9d21292db44f9366fd93b09772a3a2fab64529d4d79f32d564fad8a984dadbd5df5e3cb7c858a23920cecd07228544be50255059acf2f15324a4e52d2dd20de6a9df6eafb47bddbab743b5bbab7ee2b", 0x7a}], 0x2, &(0x7f0000000440)=ANY=[@ANYBLOB="30000000000000000100000001000000", @ANYRES32=r1, @ANYRES64=r9, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r0, @ANYBLOB="0000000000000051de0000000214f300", @ANYRESDEC=r13, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000400020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=r2, @ANYRES32, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r5], 0xa8, 0x40048c4}, 0x48008) 01:06:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:08 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) [ 681.319419] loop1: detected capacity change from 0 to 41948160 [ 681.326658] loop3: detected capacity change from 0 to 41948160 [ 681.335514] loop4: detected capacity change from 0 to 41948160 [ 681.339014] loop5: detected capacity change from 0 to 41948160 [ 681.342022] FAT-fs (loop1): invalid media value (0x00) [ 681.342644] FAT-fs (loop1): Can't find a valid FAT filesystem [ 681.345331] FAT-fs (loop5): invalid media value (0x00) [ 681.346226] FAT-fs (loop5): Can't find a valid FAT filesystem [ 681.349951] loop6: detected capacity change from 0 to 41948160 [ 681.355338] loop2: detected capacity change from 0 to 41948160 [ 681.359348] FAT-fs (loop4): invalid media value (0x00) [ 681.359998] FAT-fs (loop4): Can't find a valid FAT filesystem [ 681.360046] FAT-fs (loop3): bogus number of FAT sectors [ 681.361548] FAT-fs (loop3): Can't find a valid FAT filesystem [ 681.366156] FAT-fs (loop6): bogus number of FAT sectors [ 681.366821] FAT-fs (loop6): Can't find a valid FAT filesystem [ 681.371129] FAT-fs (loop2): bogus number of reserved sectors [ 681.371838] FAT-fs (loop2): Can't find a valid FAT filesystem 01:06:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:08 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x22, 0x80, 0x80, 0x5, 0x0, 0x6, 0x8080, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x5, 0x4}, 0x800, 0x4cb49b6b, 0x5, 0x2, 0x3, 0x5, 0x1, 0x0, 0x8001, 0x0, 0x6}, 0x0, 0xe, 0xffffffffffffffff, 0xb) prlimit64(0x0, 0xb, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000300)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r1, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000001c0)={0x10, 0x14, 0x6, 0x10, 0x3, 0x3, 0x2, 0x114, 0xffffffffffffffff}) r2 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x1c12c1, 0x1a8}, 0x18) fsetxattr$security_ima(r2, &(0x7f0000000140), 0x0, 0xfb, 0x1) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0xc, 0x0, 0x16, 0x11, 0xb, 0x6, 0x1, 0xae}) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r3, 0x0, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) syz_io_uring_submit(r3, 0x0, &(0x7f00000000c0)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index=0x4, 0x3, 0x0, 0x5, 0x1, 0x1}, 0x7) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000180)={0x28, 0x18, 0x0, 0x9, 0x6, 0x18001, 0x6, 0xbe}) 01:06:08 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:08 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) 01:06:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:08 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 681.510125] loop4: detected capacity change from 0 to 41948160 [ 681.527003] FAT-fs (loop4): invalid media value (0x00) [ 681.527652] FAT-fs (loop4): Can't find a valid FAT filesystem [ 681.540379] loop5: detected capacity change from 0 to 41948160 [ 681.566826] loop1: detected capacity change from 0 to 41948160 [ 681.570133] loop6: detected capacity change from 0 to 41948160 [ 681.574274] FAT-fs (loop5): invalid media value (0x00) [ 681.574941] FAT-fs (loop5): Can't find a valid FAT filesystem [ 681.578645] loop2: detected capacity change from 0 to 41948160 [ 681.589289] loop3: detected capacity change from 0 to 41948160 01:06:08 executing program 7: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) timer_delete(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000000)={0xc92bfb053a14a5a}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @thr={&(0x7f0000000340)="56c63a2646b946bb24422a847735bdb9ebe8c3231858b4089f447fae0f5c4efaebf9674c9903df477b592ba215a4157a1aeb815751525042996afdfc2b8d0c4ae8580a6d", &(0x7f0000000540)="649d80ffcaa9ec243de5554d70a3c4debedeb800d5352f209a33886784f48169676db7bd8fd5e24e793461ae11f8a23ddfe00723ada95a15abc11c3a26d6933bebd287a864e712390df881a471578393397852ecff22fce4fa5e142035e73ca9a184b5682b81aeff0d795882624e8c57efb11ca9cb7089b4d788c974e511a28ad98c3878562d6453f0c138ff3e57c8e4683259de7ff4f8567abb7a6faf23321a45e9e002a758be2ee6f530971f34a6259fbc66c5773669e38271490dca2ed837fed0e3f919fa592300fb"}}, &(0x7f0000000300)) timer_create(0x3, &(0x7f0000000000)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) timer_create(0x3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f00000003c0)="3b1bfa28e0e5ee544a1b823cdd969f04ab5ae0fc8f755bb078efca53f499a3d740fcdc4f6e2f5bff82383272ce6c80faef2bc7b01949f5febb574773c57ec9bb28d376be2e18d49fc350815fd24d99944255a931ad92656bd88611e573212501d96383d3f977eaee01946a8bfab5997ad41ea279ca1216481e13d889500f3e8cb93ddba0c65e4f1cab0b6295461a23d7e3dfe9636a36f5c2df267237918f14029c67acf6412a47af30140372b066202c6054d3332f4229c87c954ff55c73", &(0x7f0000000100)="86fe60120d205a3081bbcce0ead3483ebf"}}, &(0x7f00000002c0)=0x0) timer_delete(r1) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="14000000d79dc9978b4b92260500010d00000000000000000000000071814add13ff02ae85278dd0eaec84998367a52c1e11030000006b12b96c626ce82ee47fcebcfa461a6a5813efbcb3cf172665e4d53566ba932c0fd9e8da0518349dfff826dd0a36318572393d1e90a3c97f3a2709cc8c423ecdf4504864d6b7347f5827afc54ad518a3be826271942c8423c4cc73d819af3548fcaa0e6b3400"], 0x14}}, 0x0) read(r2, &(0x7f0000000080)=""/65, 0x41) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 681.597479] FAT-fs (loop1): invalid media value (0x00) [ 681.598582] FAT-fs (loop1): Can't find a valid FAT filesystem [ 681.636606] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=40407 sclass=netlink_route_socket pid=6235 comm=syz-executor.7 [ 681.645185] FAT-fs (loop2): bogus number of reserved sectors [ 681.646187] FAT-fs (loop2): Can't find a valid FAT filesystem [ 681.646932] FAT-fs (loop3): bogus number of FAT sectors [ 681.647960] FAT-fs (loop3): Can't find a valid FAT filesystem 01:06:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:08 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 681.692184] loop4: detected capacity change from 0 to 41948160 [ 681.712244] FAT-fs (loop4): invalid media value (0x00) [ 681.713211] FAT-fs (loop4): Can't find a valid FAT filesystem [ 681.754702] loop6: detected capacity change from 0 to 41948160 01:06:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:27 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) 01:06:27 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:27 executing program 7: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) timer_delete(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000000)={0xc92bfb053a14a5a}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @thr={&(0x7f0000000340)="56c63a2646b946bb24422a847735bdb9ebe8c3231858b4089f447fae0f5c4efaebf9674c9903df477b592ba215a4157a1aeb815751525042996afdfc2b8d0c4ae8580a6d", &(0x7f0000000540)="649d80ffcaa9ec243de5554d70a3c4debedeb800d5352f209a33886784f48169676db7bd8fd5e24e793461ae11f8a23ddfe00723ada95a15abc11c3a26d6933bebd287a864e712390df881a471578393397852ecff22fce4fa5e142035e73ca9a184b5682b81aeff0d795882624e8c57efb11ca9cb7089b4d788c974e511a28ad98c3878562d6453f0c138ff3e57c8e4683259de7ff4f8567abb7a6faf23321a45e9e002a758be2ee6f530971f34a6259fbc66c5773669e38271490dca2ed837fed0e3f919fa592300fb"}}, &(0x7f0000000300)) timer_create(0x3, &(0x7f0000000000)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) timer_create(0x3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f00000003c0)="3b1bfa28e0e5ee544a1b823cdd969f04ab5ae0fc8f755bb078efca53f499a3d740fcdc4f6e2f5bff82383272ce6c80faef2bc7b01949f5febb574773c57ec9bb28d376be2e18d49fc350815fd24d99944255a931ad92656bd88611e573212501d96383d3f977eaee01946a8bfab5997ad41ea279ca1216481e13d889500f3e8cb93ddba0c65e4f1cab0b6295461a23d7e3dfe9636a36f5c2df267237918f14029c67acf6412a47af30140372b066202c6054d3332f4229c87c954ff55c73", &(0x7f0000000100)="86fe60120d205a3081bbcce0ead3483ebf"}}, &(0x7f00000002c0)=0x0) timer_delete(r1) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="14000000d79dc9978b4b92260500010d00000000000000000000000071814add13ff02ae85278dd0eaec84998367a52c1e11030000006b12b96c626ce82ee47fcebcfa461a6a5813efbcb3cf172665e4d53566ba932c0fd9e8da0518349dfff826dd0a36318572393d1e90a3c97f3a2709cc8c423ecdf4504864d6b7347f5827afc54ad518a3be826271942c8423c4cc73d819af3548fcaa0e6b3400"], 0x14}}, 0x0) read(r2, &(0x7f0000000080)=""/65, 0x41) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) 01:06:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 700.040229] loop3: detected capacity change from 0 to 41948160 [ 700.046257] FAT-fs (loop3): bogus number of FAT sectors [ 700.047106] FAT-fs (loop3): Can't find a valid FAT filesystem [ 700.059496] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=40407 sclass=netlink_route_socket pid=6254 comm=syz-executor.7 [ 700.075211] loop5: detected capacity change from 0 to 41948160 [ 700.110469] loop6: detected capacity change from 0 to 41948160 [ 700.114376] FAT-fs (loop5): bogus number of FAT sectors [ 700.115681] FAT-fs (loop5): Can't find a valid FAT filesystem [ 700.119575] loop2: detected capacity change from 0 to 41948160 [ 700.126027] loop1: detected capacity change from 0 to 41948160 [ 700.134080] loop4: detected capacity change from 0 to 41948160 [ 700.156569] FAT-fs (loop2): bogus number of reserved sectors [ 700.158009] FAT-fs (loop2): Can't find a valid FAT filesystem [ 700.160679] FAT-fs (loop1): invalid media value (0x00) [ 700.162049] FAT-fs (loop1): Can't find a valid FAT filesystem [ 700.184055] FAT-fs (loop4): invalid media value (0x00) [ 700.185292] FAT-fs (loop4): Can't find a valid FAT filesystem 01:06:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:42 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) 01:06:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:42 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:42 executing program 7: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0)={0x0, 0x770f}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) recvmsg$unix(r0, &(0x7f0000001680)={&(0x7f0000000380)=@abs, 0x6e, &(0x7f0000001540)=[{&(0x7f0000000400)=""/14, 0xe}, {&(0x7f0000000440)}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/12, 0xc}], 0x4, &(0x7f0000001580)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xe0}, 0x2000) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/pps', 0x4782, 0xa0) recvmsg$unix(r6, &(0x7f0000001ac0)={&(0x7f00000016c0), 0x6e, &(0x7f0000001940)=[{&(0x7f0000000340)}, {&(0x7f0000001740)=""/93, 0x5d}, {&(0x7f00000017c0)=""/180, 0xb4}, {&(0x7f0000001880)=""/181, 0xb5}], 0x4, &(0x7f0000001980)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x130}, 0x2000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x18}, 0x0) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x50, r4, 0x10000000) r8 = syz_open_dev$usbmon(&(0x7f0000000240), 0xbb, 0x80080) syz_io_uring_submit(r2, r7, &(0x7f0000000280)=@IORING_OP_SPLICE={0x1e, 0x4, 0x0, @fd_index=0x1, 0x3, {0x0, r8}, 0x2, 0x8, 0x1, {0x0, 0x0, r5}}, 0xfffffffe) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) symlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') setresuid(0xffffffffffffffff, r9, 0x0) r10 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r11 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r11}}, 0x0) syz_io_uring_submit(r10, r7, &(0x7f0000000340)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x5, 0x0, 0xfffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, {0x2, r11}}, 0x1ff) r12 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r12, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 715.547964] loop3: detected capacity change from 0 to 41948160 [ 715.555014] loop5: detected capacity change from 0 to 41948160 [ 715.565980] loop2: detected capacity change from 0 to 41948160 [ 715.570161] FAT-fs (loop2): invalid media value (0x00) [ 715.570855] FAT-fs (loop2): Can't find a valid FAT filesystem [ 715.597434] loop4: detected capacity change from 0 to 41948160 [ 715.603027] FAT-fs (loop5): bogus number of FAT sectors [ 715.604329] FAT-fs (loop5): Can't find a valid FAT filesystem [ 715.606068] loop1: detected capacity change from 0 to 41948160 [ 715.613925] loop6: detected capacity change from 0 to 41948160 01:06:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 715.631588] FAT-fs (loop4): bogus number of FAT sectors [ 715.632893] FAT-fs (loop4): Can't find a valid FAT filesystem [ 715.637621] FAT-fs (loop1): invalid media value (0x00) [ 715.638867] FAT-fs (loop1): Can't find a valid FAT filesystem 01:06:42 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) 01:06:42 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x80208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) fsetxattr(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="757275737465642e2324273a450086d40248df4f796dbc73eed95b313aaa8e9f772ff90bffffffffc5aae7a450f6544ab9b9f42e6009cb0bfc3fe069c57338176ea9847fa197bfba883fa66df75b2b300933b5e759b7fcef0caf8b37f2d8103dee7a81f80646edffeb35aed29cd7cee2c6d2bd766c4611503b990a18a3755c87cfa095337d838af73065b1c01e04d8c19c00000000"], &(0x7f0000000040)='\\,)\']!,\x00', 0x8, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x800, 0x150) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 01:06:42 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 715.710873] loop2: detected capacity change from 0 to 41948160 [ 715.724450] FAT-fs (loop2): invalid media value (0x00) [ 715.725927] FAT-fs (loop2): Can't find a valid FAT filesystem [ 715.742224] loop3: detected capacity change from 0 to 41948160 01:06:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:42 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 715.792444] loop6: detected capacity change from 0 to 41948160 01:06:42 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 715.848066] loop4: detected capacity change from 0 to 41948160 01:06:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 715.865377] loop5: detected capacity change from 0 to 41948160 01:06:42 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) 01:06:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 715.883678] loop1: detected capacity change from 0 to 41948160 [ 715.891832] FAT-fs (loop5): bogus number of FAT sectors [ 715.892453] FAT-fs (loop5): Can't find a valid FAT filesystem [ 715.898133] FAT-fs (loop1): invalid media value (0x00) [ 715.899391] FAT-fs (loop1): Can't find a valid FAT filesystem [ 715.904590] FAT-fs (loop4): bogus number of FAT sectors [ 715.905866] FAT-fs (loop4): Can't find a valid FAT filesystem [ 715.925304] loop6: detected capacity change from 0 to 41948160 [ 715.952918] loop3: detected capacity change from 0 to 41948160 [ 715.979163] loop2: detected capacity change from 0 to 41948160 [ 716.003172] FAT-fs (loop2): invalid media value (0x00) [ 716.003813] FAT-fs (loop2): Can't find a valid FAT filesystem 01:06:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:55 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:55 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 1) [ 729.028508] FAULT_INJECTION: forcing a failure. [ 729.028508] name failslab, interval 1, probability 0, space 0, times 1 [ 729.029964] CPU: 0 PID: 6362 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 729.030790] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 729.031792] Call Trace: [ 729.032113] dump_stack+0x107/0x167 [ 729.032551] should_fail.cold+0x5/0xa [ 729.033018] should_failslab+0x5/0x20 [ 729.033477] __kmalloc_track_caller+0x79/0x370 [ 729.034037] ? strndup_user+0x74/0xe0 [ 729.034501] memdup_user+0x22/0xd0 [ 729.034932] strndup_user+0x74/0xe0 [ 729.035373] __x64_sys_mount+0x133/0x300 [ 729.035868] ? copy_mnt_ns+0xa00/0xa00 [ 729.036342] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 729.036985] ? syscall_enter_from_user_mode+0x1d/0x50 [ 729.037607] do_syscall_64+0x33/0x40 [ 729.038065] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 729.038685] RIP: 0033:0x7f42b2db2b19 [ 729.039137] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 729.041358] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 729.042284] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 729.043152] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 729.044022] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 729.044886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 729.045761] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 729.049286] loop3: detected capacity change from 0 to 41948160 [ 729.054076] loop4: detected capacity change from 0 to 41948160 [ 729.056529] loop5: detected capacity change from 0 to 41948160 [ 729.060936] loop1: detected capacity change from 0 to 41948160 [ 729.066582] loop2: detected capacity change from 0 to 41948160 [ 729.071332] loop6: detected capacity change from 0 to 41948160 [ 729.078377] FAT-fs (loop4): bogus number of FAT sectors [ 729.079116] FAT-fs (loop4): Can't find a valid FAT filesystem [ 729.081838] FAT-fs (loop1): bogus number of FAT sectors [ 729.082986] FAT-fs (loop1): Can't find a valid FAT filesystem 01:06:56 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 2) [ 729.090835] FAT-fs (loop2): invalid media value (0x00) [ 729.091977] FAT-fs (loop2): Can't find a valid FAT filesystem 01:06:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 729.135412] FAULT_INJECTION: forcing a failure. [ 729.135412] name failslab, interval 1, probability 0, space 0, times 0 [ 729.136900] CPU: 0 PID: 6376 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 729.137743] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 729.138752] Call Trace: [ 729.139079] dump_stack+0x107/0x167 [ 729.139520] should_fail.cold+0x5/0xa [ 729.139986] ? create_object.isra.0+0x3a/0xa30 [ 729.140540] should_failslab+0x5/0x20 [ 729.141008] kmem_cache_alloc+0x5b/0x310 [ 729.141503] create_object.isra.0+0x3a/0xa30 [ 729.142042] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 729.142664] __kmalloc_track_caller+0x177/0x370 [ 729.143238] ? strndup_user+0x74/0xe0 [ 729.143701] memdup_user+0x22/0xd0 [ 729.144137] strndup_user+0x74/0xe0 [ 729.144579] __x64_sys_mount+0x133/0x300 [ 729.145071] ? copy_mnt_ns+0xa00/0xa00 [ 729.145549] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 729.146193] ? syscall_enter_from_user_mode+0x1d/0x50 [ 729.146824] do_syscall_64+0x33/0x40 [ 729.147276] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 729.147897] RIP: 0033:0x7f42b2db2b19 [ 729.148353] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 729.150600] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 729.151536] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 729.152408] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 729.153278] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 729.154161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 729.155032] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 01:06:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 729.167761] loop3: detected capacity change from 0 to 41948160 01:06:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:56 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:06:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 729.245873] loop5: detected capacity change from 0 to 41948160 01:06:56 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 3) [ 729.277991] loop2: detected capacity change from 0 to 41948160 [ 729.280651] loop4: detected capacity change from 0 to 41948160 [ 729.287349] FAT-fs (loop2): invalid media value (0x00) [ 729.288207] FAT-fs (loop2): Can't find a valid FAT filesystem [ 729.294652] loop1: detected capacity change from 0 to 41948160 [ 729.303284] loop6: detected capacity change from 0 to 41948160 [ 729.316804] FAT-fs (loop1): bogus number of FAT sectors [ 729.317460] FAT-fs (loop1): Can't find a valid FAT filesystem [ 729.333557] FAULT_INJECTION: forcing a failure. [ 729.333557] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 729.336000] CPU: 1 PID: 6400 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 729.337357] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 729.339035] Call Trace: [ 729.339572] dump_stack+0x107/0x167 [ 729.340305] should_fail.cold+0x5/0xa [ 729.341071] _copy_from_user+0x2e/0x1b0 [ 729.341874] memdup_user+0x65/0xd0 [ 729.342579] strndup_user+0x74/0xe0 [ 729.343310] __x64_sys_mount+0x133/0x300 [ 729.344126] ? copy_mnt_ns+0xa00/0xa00 [ 729.344930] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 729.345988] ? syscall_enter_from_user_mode+0x1d/0x50 [ 729.347015] do_syscall_64+0x33/0x40 [ 729.347759] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 729.348794] RIP: 0033:0x7f42b2db2b19 [ 729.349546] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 729.353219] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 729.354737] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 729.356160] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 729.357584] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 729.359011] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 729.360431] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 01:07:09 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 4) 01:07:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 742.600017] FAULT_INJECTION: forcing a failure. [ 742.600017] name failslab, interval 1, probability 0, space 0, times 0 [ 742.602041] CPU: 0 PID: 6412 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 742.603196] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 742.604579] Call Trace: [ 742.605028] dump_stack+0x107/0x167 [ 742.605645] should_fail.cold+0x5/0xa [ 742.606307] ? copy_mount_options+0x55/0x180 [ 742.607055] should_failslab+0x5/0x20 [ 742.607701] kmem_cache_alloc_trace+0x55/0x320 [ 742.608485] ? _copy_from_user+0xfb/0x1b0 [ 742.609187] copy_mount_options+0x55/0x180 [ 742.610114] __x64_sys_mount+0x1a8/0x300 [ 742.610788] ? copy_mnt_ns+0xa00/0xa00 [ 742.611454] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 742.612347] ? syscall_enter_from_user_mode+0x1d/0x50 [ 742.613229] do_syscall_64+0x33/0x40 [ 742.613880] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 742.614741] RIP: 0033:0x7f42b2db2b19 [ 742.615362] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 742.618496] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 742.619782] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 742.620982] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 742.622186] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 742.623385] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 742.624577] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 01:07:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:09 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:09 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:09 executing program 7: ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000580)={0x2, 0x0, 0xd, 0x15, 0x1b2, &(0x7f0000000700)="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"}) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0xc39, 0xa6219d3}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="600100001000010000c7910000000000ff020000000000000000000000000001fc00000000000000000000000000000000000000000000000000008d00000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x160}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r2 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x24, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e23}]}, 0x24}, 0x1, 0x0, 0x0, 0xc004041}, 0x20000000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) io_uring_enter(r2, 0x58ab, 0x0, 0x0, 0x0, 0x0) r3 = getuid() ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x3) r4 = getgid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2, {r3, r4}}, './file1\x00'}) ppoll(&(0x7f00000003c0), 0x0, &(0x7f0000000400)={0x77359400}, &(0x7f0000000440)={[0x6]}, 0xfffffffffffffe70) msgget$private(0x0, 0x8c) renameat2(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) sendmsg$nl_generic(r1, &(0x7f0000000540)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x2c, 0x300, 0x70bd27, 0x25dfdbfe, {0x1e}}, 0x14}, 0x1, 0x0, 0x0, 0x4c000}, 0x20000809) [ 742.630779] loop6: detected capacity change from 0 to 41948160 [ 742.636359] loop5: detected capacity change from 0 to 41948160 [ 742.641065] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.7'. [ 742.645011] loop1: detected capacity change from 0 to 41948160 [ 742.650537] loop2: detected capacity change from 0 to 41948160 [ 742.658722] loop3: detected capacity change from 0 to 41948160 01:07:09 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 5) [ 742.668865] loop4: detected capacity change from 0 to 41948160 [ 742.685406] FAT-fs (loop2): invalid media value (0x00) [ 742.686434] FAT-fs (loop2): Can't find a valid FAT filesystem [ 742.689731] FAT-fs (loop1): bogus number of FAT sectors [ 742.690652] FAT-fs (loop1): Can't find a valid FAT filesystem [ 742.709404] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.7'. [ 742.742970] FAULT_INJECTION: forcing a failure. [ 742.742970] name failslab, interval 1, probability 0, space 0, times 0 [ 742.744890] CPU: 0 PID: 6435 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 742.746006] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 742.747386] Call Trace: [ 742.747835] dump_stack+0x107/0x167 [ 742.748443] should_fail.cold+0x5/0xa [ 742.749081] ? create_object.isra.0+0x3a/0xa30 [ 742.749857] should_failslab+0x5/0x20 01:07:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 742.750497] kmem_cache_alloc+0x5b/0x310 [ 742.751409] create_object.isra.0+0x3a/0xa30 [ 742.752146] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 742.752997] kmem_cache_alloc_trace+0x151/0x320 [ 742.753771] ? _copy_from_user+0xfb/0x1b0 [ 742.754480] copy_mount_options+0x55/0x180 [ 742.755163] __x64_sys_mount+0x1a8/0x300 [ 742.755817] ? copy_mnt_ns+0xa00/0xa00 [ 742.756450] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 742.757336] ? syscall_enter_from_user_mode+0x1d/0x50 [ 742.758208] do_syscall_64+0x33/0x40 [ 742.758838] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 742.759702] RIP: 0033:0x7f42b2db2b19 [ 742.760308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 742.763399] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 742.764668] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 742.765866] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 742.767062] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 742.768238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 742.769399] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 01:07:09 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:09 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 742.841043] loop5: detected capacity change from 0 to 41948160 01:07:09 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000000)='./mnt\x00', 0xc) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f0000000140)='debugfs\x00', 0x0, &(0x7f00000001c0)='\xe9\x00') [ 742.872133] loop2: detected capacity change from 0 to 41948160 [ 742.882864] FAT-fs (loop2): bogus number of FAT sectors [ 742.884125] FAT-fs (loop2): Can't find a valid FAT filesystem 01:07:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 742.903491] loop3: detected capacity change from 0 to 41948160 [ 742.916405] loop4: detected capacity change from 0 to 41948160 01:07:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 742.932071] loop1: detected capacity change from 0 to 41948160 01:07:09 executing program 7: fchown(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r1, 0x0) r2 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)=0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) syz_io_uring_submit(r4, r3, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x3, 0x4000, @fd_index=0x4, 0x100, &(0x7f0000000340)=""/4096, 0x1000, 0x2, 0x1}, 0x1b497581) io_uring_enter(r2, 0x58ab, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r2, 0x0, r0) lseek(r0, 0x7, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() 01:07:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 743.019461] loop5: detected capacity change from 0 to 41948160 [ 743.064035] loop3: detected capacity change from 0 to 41948160 [ 743.115929] loop4: detected capacity change from 0 to 41948160 01:07:23 executing program 7: fchown(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r1, 0x0) r2 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)=0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) syz_io_uring_submit(r4, r3, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x3, 0x4000, @fd_index=0x4, 0x100, &(0x7f0000000340)=""/4096, 0x1000, 0x2, 0x1}, 0x1b497581) io_uring_enter(r2, 0x58ab, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r2, 0x0, r0) lseek(r0, 0x7, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() 01:07:23 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:23 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:23 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:23 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 6) 01:07:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 757.011071] loop1: detected capacity change from 0 to 41948160 [ 757.023032] FAULT_INJECTION: forcing a failure. [ 757.023032] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 757.024450] CPU: 0 PID: 6492 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 757.025280] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 757.026299] Call Trace: [ 757.026619] dump_stack+0x107/0x167 [ 757.027066] should_fail.cold+0x5/0xa [ 757.027530] _copy_from_user+0x2e/0x1b0 [ 757.028019] copy_mount_options+0x76/0x180 [ 757.028532] __x64_sys_mount+0x1a8/0x300 [ 757.029027] ? copy_mnt_ns+0xa00/0xa00 [ 757.029209] loop5: detected capacity change from 0 to 41948160 [ 757.029502] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 757.029523] ? syscall_enter_from_user_mode+0x1d/0x50 [ 757.032099] do_syscall_64+0x33/0x40 [ 757.032550] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 757.033183] RIP: 0033:0x7f42b2db2b19 [ 757.033634] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 757.035752] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 757.036673] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 757.037498] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 757.038324] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 757.039138] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 757.039951] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 757.054927] loop6: detected capacity change from 0 to 41948160 [ 757.064189] loop2: detected capacity change from 0 to 41948160 [ 757.076017] loop4: detected capacity change from 0 to 41948160 [ 757.081076] loop3: detected capacity change from 0 to 41948160 [ 757.095814] FAT-fs (loop2): bogus number of FAT sectors [ 757.097334] FAT-fs (loop2): Can't find a valid FAT filesystem 01:07:37 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 7) 01:07:37 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c8e6c5e8fadeb34f6882cf00000020000000000", @ANYRES64], 0x3c}}, 0x0) 01:07:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:37 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 770.787100] FAULT_INJECTION: forcing a failure. [ 770.787100] name failslab, interval 1, probability 0, space 0, times 0 [ 770.789047] CPU: 0 PID: 6517 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 770.790177] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 770.791553] Call Trace: [ 770.791991] dump_stack+0x107/0x167 [ 770.792594] should_fail.cold+0x5/0xa [ 770.793206] ? getname_flags.part.0+0x50/0x4f0 [ 770.793948] should_failslab+0x5/0x20 [ 770.794572] kmem_cache_alloc+0x5b/0x310 [ 770.795247] getname_flags.part.0+0x50/0x4f0 [ 770.795965] ? _copy_from_user+0xfb/0x1b0 [ 770.796640] user_path_at_empty+0xa1/0x100 [ 770.797334] __x64_sys_mount+0x1e9/0x300 [ 770.797994] ? copy_mnt_ns+0xa00/0xa00 [ 770.798647] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 770.799497] ? syscall_enter_from_user_mode+0x1d/0x50 [ 770.800332] do_syscall_64+0x33/0x40 [ 770.800936] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 770.801770] RIP: 0033:0x7f42b2db2b19 [ 770.802370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 770.805315] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 770.806576] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 770.807744] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 770.808923] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 770.810100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 770.811250] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 770.812865] loop5: detected capacity change from 0 to 41948160 [ 770.814800] loop3: detected capacity change from 0 to 41948160 01:07:37 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@delsa={0x44, 0x11, 0x800, 0x70bd2b, 0x25dfdbfc, {@in=@loopback, 0x4d4, 0x2, 0x3c}, [@etimer_thresh={0x8, 0xc, 0x8}, @srcaddr={0x14, 0xd, @in=@remote}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x4000085) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@updsa={0x150, 0x10, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@private0}, {@in, 0x0, 0x32}, @in6=@ipv4={'\x00', '\xff\xff', @private}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x60, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0xa0, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e1"}}]}, 0x150}}, 0x0) [ 770.822945] loop2: detected capacity change from 0 to 41948160 [ 770.825351] loop6: detected capacity change from 0 to 41948160 [ 770.837606] loop1: detected capacity change from 0 to 41948160 [ 770.849068] loop4: detected capacity change from 0 to 41948160 [ 770.852999] FAT-fs (loop2): bogus number of FAT sectors [ 770.853929] FAT-fs (loop2): Can't find a valid FAT filesystem 01:07:37 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 8) 01:07:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:37 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:37 executing program 7: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@delsa={0x44, 0x11, 0x800, 0x70bd2b, 0x25dfdbfc, {@in=@loopback, 0x4d4, 0x2, 0x3c}, [@etimer_thresh={0x8, 0xc, 0x8}, @srcaddr={0x14, 0xd, @in=@remote}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x4000085) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@updsa={0x150, 0x10, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@private0}, {@in, 0x0, 0x32}, @in6=@ipv4={'\x00', '\xff\xff', @private}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x60, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0xa0, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e1"}}]}, 0x150}}, 0x0) 01:07:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 771.006774] FAULT_INJECTION: forcing a failure. [ 771.006774] name failslab, interval 1, probability 0, space 0, times 0 [ 771.008458] CPU: 0 PID: 6541 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 771.009485] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 771.010717] Call Trace: [ 771.011111] dump_stack+0x107/0x167 [ 771.011648] should_fail.cold+0x5/0xa [ 771.012213] ? create_object.isra.0+0x3a/0xa30 [ 771.012903] should_failslab+0x5/0x20 [ 771.013460] kmem_cache_alloc+0x5b/0x310 [ 771.014111] create_object.isra.0+0x3a/0xa30 [ 771.014758] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 771.015524] kmem_cache_alloc+0x159/0x310 [ 771.016188] getname_flags.part.0+0x50/0x4f0 [ 771.016837] ? _copy_from_user+0xfb/0x1b0 [ 771.017464] user_path_at_empty+0xa1/0x100 [ 771.018103] __x64_sys_mount+0x1e9/0x300 [ 771.018700] ? copy_mnt_ns+0xa00/0xa00 [ 771.019299] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 771.020075] ? syscall_enter_from_user_mode+0x1d/0x50 [ 771.020858] do_syscall_64+0x33/0x40 [ 771.021397] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 771.022178] RIP: 0033:0x7f42b2db2b19 [ 771.022718] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 771.025456] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 771.026588] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 771.027635] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 771.028665] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 771.029706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 771.030809] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 771.046620] loop4: detected capacity change from 0 to 41948160 [ 771.049383] loop2: detected capacity change from 0 to 41948160 [ 771.060098] loop1: detected capacity change from 0 to 41948160 [ 771.065288] loop6: detected capacity change from 0 to 41948160 01:07:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 771.103775] loop3: detected capacity change from 0 to 41948160 01:07:38 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:38 executing program 7: pwrite64(0xffffffffffffffff, &(0x7f00000000c0)="04", 0x1, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000180)=@sco={0x1f, @none}}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x40010, 0x0, 0x0, 0x1, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000007c0)=ANY=[], 0x68}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), r1) sendmsg$NL80211_CMD_STOP_NAN(r1, &(0x7f0000000480)={&(0x7f0000000280), 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x400, 0x70bd28, 0x25dfdbff, {{}, {@val={0x8, 0x3, r2}, @void}}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8081}, 0x20004000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000001e00)={0x0, 0x0, "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", "b2c526d6e9e5b6e022295656162c396518fb718ef4784ca130f8ca11abea7398779e5f0619f66a2bb6cb434a4fc5a35a1b3ca7712d33157f158041ca98135e758f4a8c75e4ef7cfadc804965a3057d1aa1deaa3ab0044cdab9e51d56afd287ff50d18b01040c7486febf13062b47367b6e6ed29adf6e8fb8c16751a1eaf144834e69d96019af742c708641d6bcf4ff9b4e4b0b96653d014cfac160761eb3dc503bb6bb0cc33432adddfe224c905c946f11b0d21e4402ddabda097631f93492677b2bcd4ce10515e5339bb72e6653d3a3a92b44d37b37cb6d501b420a0ba0b88cab773d59b4745b5ef11f0cb5b8337e7a6ce0472fe6b5ae5e8d3e338b84d83715629fb324719ee893ea4411234d8ba6e253d5dee46e7ab97b12623023266b3efe4d35c7688110001b584e0ecaea8ca1468d12360434b53ccbad63da60dc1755206d4680da9fe2408f44f73365887ee011787144c78344bd0c3622dce0dc3c02c11a9c5e00fe5f2bee40478f02556395d6de16acec1ff020276f7a8d4d8e9c339d39e7371abe05eb34f764122d6743f66b00696d88864b48d157b9e49310f659c81088d055a4f3ba533f62cb4e016d645a97d98836d7f66731aeb4b00d30184bcf77ae44de91ddba80b6dd79a1e73f8cc8fd1cda2a613b89526505a811df897134e67e7a7b8a7cf277cf52b32a88a0d3f1060c64f50ef45acadd210c8389dca7955a1a9cc3312b0297530545214d1c3b34e663984c992a99ec41c5964a414d27465080d8878687d782d7ba986a3f84718d9e7327f6188af1b0084e0474e410620968ae67965810b0f9f8f60274271f3a57fa43bac8546d3f925f67472784d3f392d69e482dad3924df358c78f30c15a21abc8b2b52794a015ce70b593aecc9fc0c753e1cc5e3891cd6f2b3c5dd1331f74fdae159654ed38501b4382fab41c5b986b58cdf527802462551a01e88988e10faa6bbc3815af0ce74395cb87b20896db42c23da8d424b7d66f0c2badc556793ba3e4a49244d21967be8077f63932cc3db31d77df4d9d668f9d9a6dc6405de24bf7ff114e0b98bc8ed382fc8d1de65f10ea7c119272940a238c8ff6e9ce01d4bb8452d39e1c60ed6dda0ca363f56e084b65fb4b07952af0fcd87f9f4fc9d15f1d072945453bf51f4279d1ac5a40af7101c04dcccdc6b73e9e3d01504bda8628acfeaafdd4e4b066e3d382c81864d5e349df7ae672b673c012ad6718b95b32ab64667b582b6a867b5374266b09f5e4a13ef5084f3ac63796559aaf5d543c78d108a1eac42517b1f55c93acd14a1f5695165955abbf9478e63caf8e89eb82a21d731f8fa546296350e7d472e80fac59b502a9705bbc1e185de0ebcc85e0edeb65f4bcad80ffa7e6373ece07e1048798804cda27665072939558de0fb35e6a78997c4449f60034022a7bfb3bd3aed5a5fa635475046b8d374df084f047eca3f42c089e830f7f01d917150ec790d9eb42bedc3678a0ccbbf808f8cbb1a6c1e7ee3a882d33adf12b5db0275d32f0bd3850e4ad74fec0fdecfb2c8c47950454d45dee8162969d1dbd0c53ec605dc998d994ff8e5ea86730e794e9ec2427d4ecfa388931b008ffa0056012842ef6cbbcde3da7106c7403c083d7fe98df2dbd0f023d0d8b263777a0c37552a6ea7ae6aba532996783886429b622b194ec03c413bc02fc14ca84f230f678720c2314010228c1eb3adcf4027029cbb15440ac0218d1067b60db6c258350ce2e2c51a15034bd7dac2d58ae79ef2849a3a66a0a55b237a71d7deaefbdbb3dbaf3a0ac610a776ac600f4d5023f1d8068747f960d145d37b6a594df10bd2a1a9a2e8196408809e53acf7ecacc3be3a3c9af76212a756620548e62b0db0ae59ec55fb77933a7eff4a42bfd959502fb8e81dd5db1caf9410b2aacecac863ccc96a989f01f3422124b336ec90d74291fb1b72fe07c6737879aae4073e1223683a1d4f2b3f8c79bca5b0283ef3d0b1094cb066ceb03ce36859e3d4abe39b1c93fb5a32a786a8b77fdbe733eddd8e3054e67f2138fa83ab6c121cdef8812816d48ea1d069527a42c38e99f5cdb8fa0f7b8b4c68b1f633bdd5c44d42641b6352f7d06952f258aaba5f80d724570691aa6fbbaf713b8dbbef58cbd8e765e182cd391a12d9647433b446518dcbd76d3969f523413e7932f365c8d19784920747a586870d15048f27e0cc0b6ecc95f152accdb32788b1a4e2c3175e55b3f8c2c5bcbd3c9eaf87d8e022efcfeb0a1588a172b8d89242e3dc72c9212589e1060379b9546fdb90dd8898569cee7059e0151b0f1ca03d4aa0ef06720d606673bfd5c1cf32ae8c8dc2ea80d4112da597a86ec91eee27bbacdbe659f9973b8858aa122dafc3bf28b2dba1e047b7ee682dabfacfabfb63ae22f721d7ed04c4b9d04916465f0b24acbee73ed61d38056215c3e2079c244ddc4093accfc91167162d11cd48f410d28c75aba063ef8bb89fbe492c5ba05b354f53dfe4337baa8250afd6ba7e0cb6a711d9e0e33c26a9acf46f609d67c5689b452b2724b174ef07814e187fbd5d795caa6101ab73048854ef4a3262486fa7234223590e4f486edc7224d94cb4abe2da96094ecbb9e60eee39178982a963af41d7d816287e3c466a41c3e8c3847c259387cd4daaec193fce86992e57266a915af622893d5ade291859c9a7d121edb0c543256405f78610600d5e5f6b987f0a6e4984f0d591d63717758bc3b61f7778db7cb7236f21d7f9e27e473203635d68abddfd8ef7507458699836f8735e9c7465fc4d24eb64f812b8faa6612158d75a2797aac5adb14f96e3ea6a53d60670d6429d087f1f258c6ec18f5520e17e5141c1385a25e784cc486e8c4aa2e548ef9bb567f7d9889bb35792b63e8c65ebd2f236c84ad3648fa839c68aedf088b33c530a6bae7da266740389fd4e07128f38e8c6c55b58356948c8d697546695b43f3f1175357c03c9aec84501c92b6bf62466914bd19609ba12b1e7d69ff90b4fe27dc11b3b4c49dcc58dd3361830222d7a9f67d201004010b4ebd65218a075fdadf19f6ffbb2b11e26e998e5eebbfa7defa0d74df4ca47c80ee566140520242855bca81ed15dd0f781a622218b146429d7500b1d5f93963842fd82c3844babbdb7cc433cba86274eed63c8c3784b13827b3db1b09c3c2a5d7159792bba7b22f08b86e7b55a954581c27c3b7b92d91cf5f59791ee79eed919bdc8f71a39674e914211697313fb062f3cbab09c3745719043534ad85f18b176a0771062ff54d3c5f7f79ef4b088aa81c8ad9bdc4ed0f824d88a2f4afe5b4d6c78dc1ab60e1c4f07a00a753b71fbbc24f4006794e181c2350f748f645519af7f733119f5d884a977accb786a2cb5d23064bea656363c61d0b87ec3ed4360fdbecccc0e224e98ed80a6d749c8d3ac73449809db21847ae9e5a4d034c3c90901f98c035cbcbe3b6fa55fc936e19cbf842dd7fd1e7e9d88ca88d797938034f9db0d3dece8e50a4e98e14e6bd8d96b0a7fb07810831bf2dc72154e12c366c5f7e0067805bc926a496d00334180d715a234b06ed266d78b2613a2faf9d06ba52f271cb8daf2c73e49f8946ed1144812e810b1129f473f4d3dcbabf9eeee67020b4c7a87a652e694aba30e05a94f97fd4a7ca9885972b7c421adaa201e8e48b95d39f917ab97063025d768fb1a2737ca1e80dada3a6b70d7ef9ba1486143cf615980886c638db237c6c9b2d1c5dc863eddb563d606e757823d707b69e294c23e90447b692b499347bff09e23c2ea726be5c772c156c95d29602826686c9ca5210915bb0d6fa13088192f2924b645693fcdd3b0c2d10526e72a31930bf0150878a67a97debed3bd77a9d8ad0699b2cfcd7dd6a19b102200162d7c1281b63ed9d9ab1a349b4e639cbc68d91f07ee82bf18771607ef10eaab4d64c75ca10b8f74a25c6a4395d4e66cf7b04e695ea318a1c97626a9c3dbfc7ddba372d0e579ee74dba82152ae9562cb8af8fa82783d2aa8ed295939dd5069cb32a82e1f4bb65aecd427a7ed0301852d33e612383107d4e8deffdffc7653262adf4d1bcc008d09a126a3383da3d254a5d82680ddb2b1d556cb6788bc421dffc4f7a8570d051b9e3b9eef5456dbe769e7ab5502677208d7444ae8110c280507986440e4c928530ce9cdb9513f4edc0dd8797968c831dda80da1dd2d09bc740383b14a4f3e9db31a9b83ef4c46e2dbc7ddaa91a2de5f845b41bd4ad6df5684140afad979902bc986f52fcb3ca36eaa33709803ad23e9cb7f12854df0b33d7670e717a64d7eef3bb14bc81a71a20b4ccda9e6bc092726d8ec2b3427894141b45284f5c2392600f1234c9ba4836495abc107cc7384c13cbd52597e5b58996332b055a8fd0e49953ca3f0a0ce2fd13f9ae2d4159fa86160cb8e6f8e08d815c069d8105347880c3201737917051c98d6691a6473d8e1899d14d51b8936544bdcea11a1e2a3d27acba118d76118e21063950394709bb75cb755b29b861b99dcaf4e9f2d0958002285015191a284e229b7c00b37be3ba8dfe4508ad6074d942c7aba4ce4c7151bb02a74ad096621659a6c49263b4a7bfc20047a3a59793852234cca33491a1a0d0cc0f34699d101c6400aa0185cc9eb779d52153bf2dbf63efef938075cd1c12a16908670a01b9b09fd22dfa7f80146cf723435a5f0189bcb33741072b5d4175015183be164d1aebe68001572ca2dcd6f3fbfb2c0f0ca71451f75b7acd735498605777a962c05988ff4e8c7cf6dbd811c163717fbbc67b6d61fe22a452f38dcfc4a6cef4030cbf94c6eeaa6d6d0c1a1b0e6af4aa23cf03eaee073d3e7f507e5a8c7038c89b1c4ab8902e03fb69c9add264bb7f6490601bb52c060cc60353c9eba0313124187c32d089cdd347bd2131b91312a5ae92f908180597cdeebeb84d908a96ceef1b179408b37fece5f240b48f2ce62ffca7871efdea8b76c0e1ee3a189023ba2b6d848cd8e2d0bb5b2df9e1d81801498379182e30eee4611387d9caeb59ff05ffe09ab2d368cda061081d639895bf43894117d49a4c5722662584250856c264fd128df65e2ae0f3ced1d4676f6af99737c9fafa78d14ed151f6da3a65e9b0946a8efbc0715b3c9a82845dbe26c70d1f68c1c79f64bcd6a58aee6130bff0c51e963c4d7d859e16bb0d42cec42032322581a7457553b8d233c2bcb93fbc8b1d8d3973ee174a2448c34dab4698ca6e58456e6070d1c45ed3590945e99a826bb875ae6ead5308c915a42a075d5e5ff1acfa181cf8f9b43c806b645ce199c28c3329ed30134ad1957c297435ec36662a6be42097be8ce8b6722107042c7ddc3be6f7bd72c9153ff413dbb007eb99bfe4057ee3d3cf3e1a93d7baae3bb389e3f07816529d915640dc5af5149f7b8458d"}) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, 0x0, 0x5, 0x0, 0x80, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_IFTYPE={0x8}]}, 0x24}}, 0x0) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000006c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000740)={0x60, 0x1, 0x1, 0x301, 0x0, 0x0, {0xc}, [@CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x101}, @CTA_SEQ_ADJ_REPLY={0xc, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xfffffffe}]}, @CTA_SEQ_ADJ_REPLY={0x14, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x38}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x8000}]}, @CTA_SEQ_ADJ_ORIG={0x1c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x9}]}, @CTA_LABELS_MASK={0x8, 0x17, [0x200]}]}, 0x60}, 0x1, 0x0, 0x0, 0x40004}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000004c0)=""/160, &(0x7f0000000000)=0xa0) 01:07:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 771.186451] loop1: detected capacity change from 0 to 41948160 [ 771.217826] loop2: detected capacity change from 0 to 41948160 [ 771.238545] loop3: detected capacity change from 0 to 41948160 01:07:52 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 9) 01:07:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:52 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:52 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(0xffffffffffffffff, 0x3312, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x81403, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x4, 0x3, 0xfffffffc, 0x2, 0x3, 0x400, 0xfffe, 0x0, 0xfffffffc, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x101, 0x46d) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x14, r3, 0x1}, 0x14}}, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000440)=0x7, 0x6ee7) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="210c00feffffff0200003b1fc96404"], 0x2c}}, 0x8890) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r4) sendfile(0xffffffffffffffff, r2, 0x0, 0x3) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r5, &(0x7f00000000c0)="04", 0x1, 0x3ff03) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x1000, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="4ec066696c653010"]) ioctl$LOOP_SET_STATUS(r6, 0x4c02, &(0x7f00000002c0)={0x0, {}, 0x0, {}, 0xff, 0x3, 0x12, 0x14, "89f5e098115db60136d1d378e45f29636f0a74d7fd2b954ac53340fa745e40721eec0c08b7d035177b2bf6830e4e381a21ec2040793bae1a3f3ff60b4feb9ee1", "bf1047a99b9c26db92c45dc422b7290d00", [0x3, 0x8]}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) sendfile(r1, r0, 0x0, 0xffffffff000) [ 785.087931] loop3: detected capacity change from 0 to 41948160 [ 785.103397] FAULT_INJECTION: forcing a failure. [ 785.103397] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 785.106032] CPU: 1 PID: 6592 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 785.107522] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 785.109292] Call Trace: [ 785.109857] dump_stack+0x107/0x167 01:07:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 785.110653] should_fail.cold+0x5/0xa [ 785.111726] strncpy_from_user+0x34/0x470 [ 785.112617] getname_flags.part.0+0x95/0x4f0 [ 785.113559] ? _copy_from_user+0xfb/0x1b0 [ 785.114471] user_path_at_empty+0xa1/0x100 [ 785.115386] __x64_sys_mount+0x1e9/0x300 [ 785.116262] ? copy_mnt_ns+0xa00/0xa00 [ 785.117097] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 785.118224] ? syscall_enter_from_user_mode+0x1d/0x50 [ 785.119338] do_syscall_64+0x33/0x40 [ 785.120145] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 785.121212] RIP: 0033:0x7f42b2db2b19 [ 785.122004] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 785.125921] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 785.127570] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 785.129089] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 785.130631] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 785.132160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 785.133662] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 785.146114] loop6: detected capacity change from 0 to 41948160 [ 785.172629] loop4: detected capacity change from 0 to 41948160 [ 785.185020] loop1: detected capacity change from 0 to 41948160 [ 785.190354] loop5: detected capacity change from 0 to 41948160 [ 785.204168] loop2: detected capacity change from 0 to 41948160 01:07:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:52 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 10) 01:07:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 785.365935] loop1: detected capacity change from 0 to 41948160 [ 785.380936] loop5: detected capacity change from 0 to 41948160 [ 785.389383] FAULT_INJECTION: forcing a failure. [ 785.389383] name failslab, interval 1, probability 0, space 0, times 0 [ 785.391870] CPU: 1 PID: 6621 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 785.393328] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 785.395079] Call Trace: [ 785.395644] dump_stack+0x107/0x167 [ 785.396414] should_fail.cold+0x5/0xa [ 785.397224] ? alloc_fs_context+0x57/0x840 [ 785.398113] should_failslab+0x5/0x20 [ 785.398934] kmem_cache_alloc_trace+0x55/0x320 [ 785.399910] alloc_fs_context+0x57/0x840 [ 785.400777] path_mount+0xab1/0x21e0 [ 785.401578] ? strncpy_from_user+0x9e/0x470 [ 785.402512] ? finish_automount+0xa90/0xa90 [ 785.403443] ? getname_flags.part.0+0x1dd/0x4f0 [ 785.404448] ? _copy_from_user+0xfb/0x1b0 [ 785.405361] __x64_sys_mount+0x282/0x300 [ 785.406247] ? copy_mnt_ns+0xa00/0xa00 [ 785.407105] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 785.408251] ? syscall_enter_from_user_mode+0x1d/0x50 [ 785.409381] do_syscall_64+0x33/0x40 [ 785.410201] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 785.411324] RIP: 0033:0x7f42b2db2b19 [ 785.412130] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 785.416109] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 785.417750] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 785.419297] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 785.420835] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 785.422393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 785.423930] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 01:07:52 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:07:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 785.482563] loop4: detected capacity change from 0 to 41948160 01:07:52 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$AUDIT_MAKE_EQUIV(r0, 0x0, 0x450745c438580058) r1 = openat$nvram(0xffffffffffffff9c, 0x0, 0x60401, 0x0) lseek(r1, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0xe11, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000000c0)={0x24, 0x1a, 0x69844ea0a6ddcd11, 0x0, 0x0, {}, [@typed={0xd, 0x0, 0x0, 0x0, @str='[}\xef(.,)(\x00'}]}, 0x24}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), r1) fstatfs(r1, &(0x7f0000000180)=""/216) syncfs(r2) r4 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r4, 0x0) io_uring_enter(r4, 0x58ab, 0x0, 0x0, 0x0, 0x0) close(r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000001d0021000100000000000000040002000800000000000000"], 0x1c}}, 0x0) [ 785.504448] loop2: detected capacity change from 0 to 41948160 [ 785.559541] loop6: detected capacity change from 0 to 41948160 [ 785.569070] loop5: detected capacity change from 0 to 41948160 01:08:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:08:06 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:08:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:08:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:08:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:08:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 01:08:06 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 01:08:06 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 11) [ 799.270582] loop5: detected capacity change from 0 to 41948160 [ 799.279393] loop3: detected capacity change from 0 to 41948160 [ 799.282065] FAULT_INJECTION: forcing a failure. [ 799.282065] name failslab, interval 1, probability 0, space 0, times 0 [ 799.284477] CPU: 1 PID: 6665 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 799.285920] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 799.287672] Call Trace: [ 799.288235] dump_stack+0x107/0x167 [ 799.289005] should_fail.cold+0x5/0xa [ 799.289808] ? create_object.isra.0+0x3a/0xa30 [ 799.290780] should_failslab+0x5/0x20 [ 799.291582] kmem_cache_alloc+0x5b/0x310 [ 799.292441] create_object.isra.0+0x3a/0xa30 [ 799.293369] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 799.294454] kmem_cache_alloc_trace+0x151/0x320 [ 799.295435] alloc_fs_context+0x57/0x840 [ 799.296306] path_mount+0xab1/0x21e0 [ 799.297095] ? strncpy_from_user+0x9e/0x470 [ 799.298011] ? finish_automount+0xa90/0xa90 [ 799.298926] ? getname_flags.part.0+0x1dd/0x4f0 [ 799.299919] ? _copy_from_user+0xfb/0x1b0 [ 799.300805] __x64_sys_mount+0x282/0x300 [ 799.301676] ? copy_mnt_ns+0xa00/0xa00 [ 799.302568] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 799.303693] ? syscall_enter_from_user_mode+0x1d/0x50 [ 799.304799] do_syscall_64+0x33/0x40 [ 799.305599] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 799.306709] RIP: 0033:0x7f42b2db2b19 [ 799.307509] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 799.311472] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 799.313102] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 799.314702] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 799.316232] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 799.317762] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 799.319292] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 01:08:06 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 799.324858] loop6: detected capacity change from 0 to 41948160 [ 799.332185] loop2: detected capacity change from 0 to 41948160 [ 799.340120] loop4: detected capacity change from 0 to 41948160 [ 799.348052] loop1: detected capacity change from 0 to 41948160 01:08:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:08:06 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 01:08:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 799.531021] loop2: detected capacity change from 0 to 41948160 [ 799.541838] loop6: detected capacity change from 0 to 41948160 [ 799.559121] loop5: detected capacity change from 0 to 41948160 01:08:18 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 01:08:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:08:18 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 12) 01:08:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') [ 811.216216] loop1: detected capacity change from 0 to 41948160 01:08:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:08:18 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:08:18 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:08:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:08:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 811.242238] loop4: detected capacity change from 0 to 41948160 [ 811.252952] loop6: detected capacity change from 0 to 41948160 [ 811.257413] FAULT_INJECTION: forcing a failure. [ 811.257413] name failslab, interval 1, probability 0, space 0, times 0 [ 811.258842] CPU: 0 PID: 6697 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 811.259692] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 811.260739] Call Trace: [ 811.261072] dump_stack+0x107/0x167 [ 811.261528] should_fail.cold+0x5/0xa [ 811.262006] ? legacy_init_fs_context+0x44/0xe0 [ 811.262594] should_failslab+0x5/0x20 [ 811.263071] kmem_cache_alloc_trace+0x55/0x320 [ 811.263642] ? lockdep_init_map_type+0x2c7/0x780 [ 811.264236] legacy_init_fs_context+0x44/0xe0 [ 811.264804] ? generic_parse_monolithic+0x1f0/0x1f0 [ 811.265423] alloc_fs_context+0x4fd/0x840 [ 811.265946] path_mount+0xab1/0x21e0 [ 811.266413] ? strncpy_from_user+0x9e/0x470 [ 811.266960] ? finish_automount+0xa90/0xa90 [ 811.267498] ? getname_flags.part.0+0x1dd/0x4f0 [ 811.268084] ? _copy_from_user+0xfb/0x1b0 [ 811.268607] __x64_sys_mount+0x282/0x300 [ 811.269113] ? copy_mnt_ns+0xa00/0xa00 [ 811.269603] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 811.270261] ? syscall_enter_from_user_mode+0x1d/0x50 [ 811.270925] do_syscall_64+0x33/0x40 [ 811.271392] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 811.272033] RIP: 0033:0x7f42b2db2b19 [ 811.272496] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 811.274810] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 811.275764] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 811.276657] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 811.277555] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 811.278447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 811.279349] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 811.288234] loop5: detected capacity change from 0 to 41948160 [ 811.295027] loop3: detected capacity change from 0 to 41948160 [ 811.299922] loop2: detected capacity change from 0 to 41948160 01:08:18 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 13) [ 811.338173] loop1: detected capacity change from 0 to 41948160 01:08:18 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 811.354704] FAULT_INJECTION: forcing a failure. [ 811.354704] name failslab, interval 1, probability 0, space 0, times 0 [ 811.356193] CPU: 0 PID: 6720 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 811.357022] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 811.358030] Call Trace: [ 811.358352] dump_stack+0x107/0x167 [ 811.358803] should_fail.cold+0x5/0xa [ 811.359288] ? create_object.isra.0+0x3a/0xa30 [ 811.359857] should_failslab+0x5/0x20 [ 811.360331] kmem_cache_alloc+0x5b/0x310 [ 811.360839] create_object.isra.0+0x3a/0xa30 [ 811.361385] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 811.362022] kmem_cache_alloc_trace+0x151/0x320 [ 811.362610] ? lockdep_init_map_type+0x2c7/0x780 [ 811.363204] legacy_init_fs_context+0x44/0xe0 [ 811.363764] ? generic_parse_monolithic+0x1f0/0x1f0 [ 811.364389] alloc_fs_context+0x4fd/0x840 [ 811.364911] path_mount+0xab1/0x21e0 [ 811.365409] ? strncpy_from_user+0x9e/0x470 [ 811.365956] ? finish_automount+0xa90/0xa90 [ 811.366502] ? getname_flags.part.0+0x1dd/0x4f0 [ 811.367083] ? _copy_from_user+0xfb/0x1b0 [ 811.367605] __x64_sys_mount+0x282/0x300 [ 811.368114] ? copy_mnt_ns+0xa00/0xa00 [ 811.368601] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 811.369264] ? syscall_enter_from_user_mode+0x1d/0x50 [ 811.369907] do_syscall_64+0x33/0x40 [ 811.370374] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 811.371024] RIP: 0033:0x7f42b2db2b19 [ 811.371486] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 811.373798] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 811.374767] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 811.375656] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 811.376544] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 811.377436] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 811.378328] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 01:08:18 executing program 7: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(0x0, 0x0, 0x2001) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7002) ioctl$BTRFS_IOC_RM_DEV(r1, 0x5000940b, &(0x7f00000004c0)={{r2}, "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"}) r3 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000001780)={{0x2, 0x0, @remote}, {0x308}, 0xac1414f1, {0x2, 0x0, @broadcast}}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x7, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x5, 0xe1, 0x4, 0xff, 0x0, 0x7fff, 0x4000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000280)}, 0x44d1, 0x2, 0x0, 0x2, 0x7, 0x20af, 0x401, 0x0, 0x5, 0x0, 0x7fff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x94) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000240)) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) r4 = syz_open_dev$usbmon(&(0x7f0000000340), 0x3, 0x40680) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[@ANYBLOB="f2ffffff0000000000010000000080000000000000000000007f00000000000000000000000100080002000000c8a12b0300000000000000003701634185c865000000000000000000006dff00"/95]) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) syz_open_dev$hidraw(&(0x7f0000000200), 0xa0, 0x400000) 01:08:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 01:08:18 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 01:08:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:08:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 01:08:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 811.464059] loop3: detected capacity change from 0 to 41948160 [ 811.470476] loop4: detected capacity change from 0 to 41948160 [ 811.476641] loop2: detected capacity change from 0 to 41948160 [ 811.501183] loop6: detected capacity change from 0 to 41948160 [ 811.525173] loop5: detected capacity change from 0 to 41948160 01:08:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:08:18 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 811.538100] loop1: detected capacity change from 0 to 41948160 [ 811.599537] loop4: detected capacity change from 0 to 41948160 [ 811.638627] loop2: detected capacity change from 0 to 41948160 01:08:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:08:32 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:08:32 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 14) 01:08:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 01:08:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 01:08:32 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 01:08:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:08:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 825.975197] loop6: detected capacity change from 0 to 41948160 [ 825.987040] loop1: detected capacity change from 0 to 41948160 [ 825.997860] FAULT_INJECTION: forcing a failure. [ 825.997860] name failslab, interval 1, probability 0, space 0, times 0 [ 826.001221] CPU: 0 PID: 6772 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 826.003258] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 826.005719] Call Trace: [ 826.006500] dump_stack+0x107/0x167 [ 826.007583] should_fail.cold+0x5/0xa [ 826.008560] ? v9fs_mount+0x5a/0x8f0 [ 826.009497] should_failslab+0x5/0x20 [ 826.010460] kmem_cache_alloc_trace+0x55/0x320 [ 826.011656] ? v9fs_write_inode+0x60/0x60 [ 826.012709] v9fs_mount+0x5a/0x8f0 [ 826.013603] ? v9fs_write_inode+0x60/0x60 [ 826.014670] legacy_get_tree+0x105/0x220 [ 826.015710] vfs_get_tree+0x8e/0x300 [ 826.016657] path_mount+0x1490/0x21e0 [ 826.017629] ? strncpy_from_user+0x9e/0x470 [ 826.018745] ? finish_automount+0xa90/0xa90 [ 826.019813] ? getname_flags.part.0+0x1dd/0x4f0 [ 826.020993] ? _copy_from_user+0xfb/0x1b0 [ 826.022036] __x64_sys_mount+0x282/0x300 [ 826.023069] ? copy_mnt_ns+0xa00/0xa00 [ 826.024054] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 826.025383] ? syscall_enter_from_user_mode+0x1d/0x50 [ 826.026678] do_syscall_64+0x33/0x40 [ 826.027621] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 826.028907] RIP: 0033:0x7f42b2db2b19 [ 826.029846] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 826.034548] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 826.036503] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 826.038327] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 826.040430] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 826.042319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 826.044146] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 826.046572] loop2: detected capacity change from 0 to 41948160 [ 826.054449] loop3: detected capacity change from 0 to 41948160 01:08:33 executing program 7: r0 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x35, 0x33, 0x64, 0x31, 0x0, 0x61, 0x32, 0x30, 0x31, 0x31, 0x30, 0x32, 0x30, 0x35, 0x35, 0x64]}, &(0x7f0000000080)={0x0, "0e0226a2f96f62bf83f0046f690f2b70d340410b658bdee1ab12945c383609115a7d8c7968932d6e63de9b2f82595cc905b5aca7c4cae236673ce6ab10d0f4ba", 0x21}, 0x48, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffb, r1, 0x0) keyctl$update(0x2, r1, &(0x7f0000000100)="e0a0bd035eddd4daf1f0f7adf7946727b462a7018bf82ba917a039e77426be30b33ff803c9a5018492ab829a10ba44bae268446b67a66332aec27652dd1992d378a03d2a86758c5dcf65a0034b35d63880f51ce735462e4b54cdd5f0ebd420ec913f2c15d190887529aeaa0f0a7ac8db7baba1649f80fe125f048866efc686631b6be61a8fc9b44a95f6fb76ff013e59c9009f06d790fb1fcf86cefef131bfd46679a515c8c631144c5862aa0113585467804743fd0662307e8f", 0xba) getgroups(0x2, &(0x7f00000001c0)=[0xee01, 0xee00]) keyctl$chown(0x4, r1, 0xee01, r2) fcntl$getownex(r0, 0x10, &(0x7f00000014c0)={0x0, 0x0}) r5 = fcntl$dupfd(r0, 0x0, r0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001500), 0x200000, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f0000000280)="b7f2927c5b76bb15a4cb2017223692cc423a4e6f58fdf9c6a985cc4dba6e", 0x1e}, {&(0x7f00000002c0)="58c3ed20f070ab2ec9b3d24c4f84ab143a73877928368f6fa3f0915cd4b2a99f66d6784fbbe2d02a385f26da5c4f9ba5754a1a69a8acec6ec87365b93d0878f2a511fb014aa77f4c2431f0ee4ab959f6808b66258d56a0fdc815e3d5893c81fe2ba990e9e323e62edd70306dff5eee2c56733fb63ed940c306ba8b2fd3bb39b48230a56cb9591d04e7c8aad20c836863c90780e01e83e010c95eebd5e6f10fa95a255c814d1e87545ba2a58cd7fac69a2c6ffc9264", 0xb5}, {&(0x7f0000000380)="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", 0x1000}, {&(0x7f0000001380)="3ce6eb43e820c84f5921d7f2d79e26cb9cee7151ed8b6cebeaa3fd5377ea9195e4a72ea742405827846042fc57e407d488009d6a5b2ea5bd8fd6760d6c65e42f1ee38cd6d0b6fc5968214903216ea41c167a725a0d5abbdf", 0x58}, {&(0x7f0000001400)="1b47f52488764cb7ba27e45adedc656b350ffd3471d7d749c8ad006970aee8f9e4650c6538212cd3b5eb056381ee5b2d57625277b31545893bb7d3bb", 0x3c}], 0x5, &(0x7f0000001540)=[@cred={{0x1c, 0x1, 0x2, {r4, 0xee01, r2}}}, @rights={{0x34, 0x1, 0x1, [r5, r0, r6, r0, r0, r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff, r2}}}], 0x78, 0x4000000}, 0x4000) recvmmsg$unix(r5, &(0x7f0000001ec0)=[{{&(0x7f0000001600)=@abs, 0x6e, &(0x7f0000001cc0)=[{&(0x7f0000001680)=""/195, 0xc3}, {&(0x7f0000001780)=""/114, 0x72}, {&(0x7f0000001800)=""/104, 0x68}, {&(0x7f0000001880)=""/97, 0x61}, {&(0x7f0000001900)=""/238, 0xee}, {&(0x7f0000001a00)=""/123, 0x7b}, {&(0x7f0000001a80)=""/235, 0xeb}, {&(0x7f0000001b80)=""/56, 0x38}, {&(0x7f0000001bc0)=""/118, 0x76}, {&(0x7f0000001c40)=""/77, 0x4d}], 0xa, &(0x7f0000001d80)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x120}}], 0x1, 0x40000040, &(0x7f0000001f00)) keyctl$chown(0x4, r1, r8, r2) r10 = add_key$keyring(&(0x7f0000001f40), &(0x7f0000001f80)={'syz', 0x1}, 0x0, 0x0, r1) r11 = socket$nl_xfrm(0x10, 0x3, 0x6) fsconfig$FSCONFIG_SET_FD(r7, 0x5, &(0x7f0000001fc0)='fscrypt:', 0x0, r11) [ 826.076075] loop5: detected capacity change from 0 to 41948160 keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000002000)={r10, 0x1000, 0x67}, &(0x7f0000002040)={'enc=', 'raw', ' hash=', {'blake2s-128-x86\x00'}}, &(0x7f00000020c0)="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", &(0x7f00000030c0)="f3e5133f4588da99787f69e6156f1527620cf5f0d7718e673c25b3f9ca2af02854e57e4dfaf08dd25f2bd3e7bdbbfe84451d90e90d5be330121fdf18eaacc8041e8aa516a00cd07c88045d9a8e55ba77e81e20cb0ac41e20ace6811e573845de7dbc817a6ffce2") r12 = add_key(&(0x7f0000003140)='keyring\x00', &(0x7f0000003180)={'syz', 0x1}, &(0x7f00000031c0)="9f957bceb7e7f64b4b16314d91a9a63e81c2", 0x12, r1) write$binfmt_script(r9, &(0x7f0000003200)={'#! ', './file0', [{0x20, 'raw'}, {}, {0x20, 'fscrypt:'}, {0x20, 'syz'}, {0x20, 'fscrypt:'}], 0xa, "12479a05a16a86e6158d242a79d8bca99eb415ecdc40539ff7c6d9ffe7ed3a1bbe59ff2432c2af2d55e9760ad8afbeaf6a94ed162298311a7bbff905ed96c84e1bc66887a7f940279b0f0f2567a5c4d7dc70e44a4852b949b65d45c94ef2a25b6e0ec6c6be1f9f8272eb2ac9b0354b674b149891f995a761e639675381043857020e8ab32a1b3507cb45867a5b6b3de1eb0dde6cf24ca3e57d5ad4c79e8dbafa0d3894b94aeeec005c44036e0a0db195dfcf9b4f"}, 0xda) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003300)={{{@in=@private, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000003400)=0xe8) keyctl$chown(0x4, r12, r13, r3) [ 826.093314] loop4: detected capacity change from 0 to 41948160 01:08:33 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 15) 01:08:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:08:33 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:08:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 01:08:33 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 01:08:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') [ 826.240238] FAULT_INJECTION: forcing a failure. [ 826.240238] name failslab, interval 1, probability 0, space 0, times 0 [ 826.243039] CPU: 0 PID: 6793 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 826.244726] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 826.246688] Call Trace: [ 826.247307] dump_stack+0x107/0x167 [ 826.248182] should_fail.cold+0x5/0xa [ 826.249100] ? create_object.isra.0+0x3a/0xa30 [ 826.250181] should_failslab+0x5/0x20 [ 826.251084] kmem_cache_alloc+0x5b/0x310 [ 826.252104] ? cred_has_capability.isra.0+0x152/0x2b0 [ 826.253339] create_object.isra.0+0x3a/0xa30 [ 826.254365] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 826.255587] kmem_cache_alloc_trace+0x151/0x320 [ 826.256681] ? v9fs_write_inode+0x60/0x60 [ 826.257656] v9fs_mount+0x5a/0x8f0 [ 826.258537] ? v9fs_write_inode+0x60/0x60 [ 826.259549] legacy_get_tree+0x105/0x220 [ 826.260491] vfs_get_tree+0x8e/0x300 [ 826.261335] path_mount+0x1490/0x21e0 [ 826.262198] ? strncpy_from_user+0x9e/0x470 [ 826.263242] ? finish_automount+0xa90/0xa90 [ 826.264262] ? getname_flags.part.0+0x1dd/0x4f0 [ 826.265368] ? _copy_from_user+0xfb/0x1b0 [ 826.266349] __x64_sys_mount+0x282/0x300 [ 826.267287] ? copy_mnt_ns+0xa00/0xa00 [ 826.268226] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 826.269419] ? syscall_enter_from_user_mode+0x1d/0x50 [ 826.270615] do_syscall_64+0x33/0x40 [ 826.271493] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 826.272672] RIP: 0033:0x7f42b2db2b19 [ 826.273543] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 826.277798] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 826.279575] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 826.281223] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 826.282968] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 826.284671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 826.286421] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 826.290355] loop5: detected capacity change from 0 to 41948160 [ 826.323231] loop4: detected capacity change from 0 to 41948160 [ 826.350172] loop3: detected capacity change from 0 to 41948160 01:08:48 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 16) 01:08:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 841.274649] loop6: detected capacity change from 0 to 41948160 [ 841.289058] FAULT_INJECTION: forcing a failure. [ 841.289058] name failslab, interval 1, probability 0, space 0, times 0 [ 841.290424] CPU: 0 PID: 6816 Comm: syz-executor.6 Not tainted 5.10.242 #1 [ 841.291265] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 841.292306] Call Trace: [ 841.292630] dump_stack+0x107/0x167 [ 841.293076] should_fail.cold+0x5/0xa [ 841.293537] ? getname_flags.part.0+0x50/0x4f0 [ 841.294091] should_failslab+0x5/0x20 [ 841.294570] kmem_cache_alloc+0x5b/0x310 [ 841.295074] getname_flags.part.0+0x50/0x4f0 [ 841.295608] getname_flags+0x9a/0xe0 [ 841.296060] __x64_sys_rename+0x56/0xa0 [ 841.296540] do_syscall_64+0x33/0x40 [ 841.296993] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 841.297617] RIP: 0033:0x7fae24b00b19 [ 841.298072] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 841.300310] RSP: 002b:00007fae22076188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 841.301234] RAX: ffffffffffffffda RBX: 00007fae24c13f60 RCX: 00007fae24b00b19 [ 841.302107] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 841.302981] RBP: 00007fae220761d0 R08: 0000000000000000 R09: 0000000000000000 [ 841.303845] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 841.304712] R13: 00007ffca61ab64f R14: 00007fae22076300 R15: 0000000000022000 [ 841.315638] FAULT_INJECTION: forcing a failure. [ 841.315638] name failslab, interval 1, probability 0, space 0, times 0 [ 841.317031] CPU: 0 PID: 6818 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 841.317883] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 841.319168] Call Trace: [ 841.319494] dump_stack+0x107/0x167 [ 841.319938] should_fail.cold+0x5/0xa [ 841.320400] should_failslab+0x5/0x20 [ 841.320869] __kmalloc_track_caller+0x79/0x370 [ 841.321432] ? v9fs_session_init+0xa7/0x1680 [ 841.321972] kstrdup+0x36/0x70 [ 841.322363] v9fs_session_init+0xa7/0x1680 [ 841.322896] ? find_held_lock+0x2c/0x110 [ 841.323395] ? kmem_cache_alloc_trace+0x151/0x320 [ 841.323985] ? v9fs_show_options+0x690/0x690 [ 841.324525] ? trace_hardirqs_on+0x5b/0x180 [ 841.325052] ? kasan_unpoison_shadow+0x33/0x50 [ 841.325605] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 841.326226] v9fs_mount+0x79/0x8f0 [ 841.326659] ? v9fs_write_inode+0x60/0x60 [ 841.327173] legacy_get_tree+0x105/0x220 [ 841.327672] vfs_get_tree+0x8e/0x300 [ 841.328128] path_mount+0x1490/0x21e0 [ 841.328599] ? strncpy_from_user+0x9e/0x470 [ 841.329130] ? finish_automount+0xa90/0xa90 [ 841.329654] ? getname_flags.part.0+0x1dd/0x4f0 [ 841.330225] ? _copy_from_user+0xfb/0x1b0 [ 841.330734] __x64_sys_mount+0x282/0x300 [ 841.331238] ? copy_mnt_ns+0xa00/0xa00 [ 841.331717] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 841.332354] ? syscall_enter_from_user_mode+0x1d/0x50 [ 841.332985] do_syscall_64+0x33/0x40 [ 841.333436] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 841.334067] RIP: 0033:0x7f42b2db2b19 [ 841.334520] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 841.336807] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 841.337741] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 841.338612] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 841.339500] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 841.340393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 841.341284] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 01:08:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:08:48 executing program 7: setpriority(0x2, 0xffffffffffffffff, 0x0) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYRESDEC], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x2, @broadcast, 'bridge_slave_1\x00'}}, 0x80) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c9b65ae5b5d5dee79000000000068df49fc6e2bb0d200ca89e4fa7634509807000000000000", @ANYBLOB="87ce2abd7000ffdbdf250100000008000800000000000800090001002000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) r1 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000200)) getdents64(r0, &(0x7f0000000100)=""/32, 0x20) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf2500000000080009000000000008000700", @ANYRES32=r1, @ANYBLOB="060010000050001008000100", @ANYRES32, @ANYBLOB="0800080004000000080004000a010102"], 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x41e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa, 0x0, @perf_config_ext, 0x90200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) unshare(0x48020200) 01:08:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:08:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 01:08:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 01:08:48 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 1) 01:08:48 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 2) [ 841.346048] loop5: detected capacity change from 0 to 41948160 [ 841.364369] loop4: detected capacity change from 0 to 41948160 [ 841.381047] loop3: detected capacity change from 0 to 41948160 [ 841.386885] loop2: detected capacity change from 0 to 41948160 [ 841.390247] loop1: detected capacity change from 0 to 41948160 01:08:48 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 17) [ 841.428457] loop6: detected capacity change from 0 to 41948160 01:08:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 1) [ 841.496289] FAULT_INJECTION: forcing a failure. [ 841.496289] name failslab, interval 1, probability 0, space 0, times 0 [ 841.498995] CPU: 1 PID: 6840 Comm: syz-executor.6 Not tainted 5.10.242 #1 [ 841.500590] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 841.502532] Call Trace: [ 841.503166] dump_stack+0x107/0x167 [ 841.504031] should_fail.cold+0x5/0xa [ 841.504928] ? create_object.isra.0+0x3a/0xa30 [ 841.506001] should_failslab+0x5/0x20 [ 841.506903] kmem_cache_alloc+0x5b/0x310 [ 841.507866] create_object.isra.0+0x3a/0xa30 [ 841.508895] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 841.510085] kmem_cache_alloc+0x159/0x310 [ 841.511114] getname_flags.part.0+0x50/0x4f0 [ 841.512128] getname_flags+0x9a/0xe0 [ 841.512985] __x64_sys_rename+0x56/0xa0 [ 841.513903] do_syscall_64+0x33/0x40 01:08:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 01:08:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 841.514757] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 841.516178] RIP: 0033:0x7fae24b00b19 [ 841.517037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 841.521200] RSP: 002b:00007fae22076188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 841.522952] RAX: ffffffffffffffda RBX: 00007fae24c13f60 RCX: 00007fae24b00b19 [ 841.524586] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 841.525664] FAULT_INJECTION: forcing a failure. [ 841.525664] name failslab, interval 1, probability 0, space 0, times 0 [ 841.526219] RBP: 00007fae220761d0 R08: 0000000000000000 R09: 0000000000000000 [ 841.526230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 841.526247] R13: 00007ffca61ab64f R14: 00007fae22076300 R15: 0000000000022000 [ 841.532555] CPU: 0 PID: 6843 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 841.533458] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 841.534537] Call Trace: [ 841.534890] dump_stack+0x107/0x167 [ 841.535351] should_fail.cold+0x5/0xa [ 841.535843] ? create_object.isra.0+0x3a/0xa30 [ 841.536434] should_failslab+0x5/0x20 [ 841.536930] kmem_cache_alloc+0x5b/0x310 [ 841.537468] create_object.isra.0+0x3a/0xa30 [ 841.538038] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 841.538696] __kmalloc_track_caller+0x177/0x370 [ 841.539300] ? v9fs_session_init+0xa7/0x1680 [ 841.539876] ? kernel_text_address+0xf2/0x120 [ 841.540462] kstrdup+0x36/0x70 [ 841.540883] v9fs_session_init+0xa7/0x1680 [ 841.541427] ? lock_release+0x680/0x680 [ 841.541942] ? find_held_lock+0x2c/0x110 [ 841.542483] ? kmem_cache_alloc_trace+0x151/0x320 [ 841.543120] ? v9fs_show_options+0x690/0x690 [ 841.543705] ? trace_hardirqs_on+0x5b/0x180 [ 841.544280] ? kasan_unpoison_shadow+0x33/0x50 [ 841.544877] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 841.545559] v9fs_mount+0x79/0x8f0 [ 841.546034] ? v9fs_write_inode+0x60/0x60 [ 841.546583] legacy_get_tree+0x105/0x220 [ 841.547120] vfs_get_tree+0x8e/0x300 [ 841.547599] path_mount+0x1490/0x21e0 [ 841.548092] ? strncpy_from_user+0x9e/0x470 [ 841.548646] ? finish_automount+0xa90/0xa90 [ 841.549225] ? getname_flags.part.0+0x1dd/0x4f0 [ 841.549825] ? _copy_from_user+0xfb/0x1b0 [ 841.550363] __x64_sys_mount+0x282/0x300 [ 841.550894] ? copy_mnt_ns+0xa00/0xa00 [ 841.551393] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 841.552084] ? syscall_enter_from_user_mode+0x1d/0x50 [ 841.552749] do_syscall_64+0x33/0x40 [ 841.553240] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 841.553893] RIP: 0033:0x7f42b2db2b19 [ 841.554369] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 841.556792] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 841.557785] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 841.558705] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 841.559654] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 841.560594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 841.561517] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 841.562864] loop3: detected capacity change from 0 to 41948160 01:08:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:08:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 841.591622] loop4: detected capacity change from 0 to 41948160 [ 841.616142] FAULT_INJECTION: forcing a failure. [ 841.616142] name failslab, interval 1, probability 0, space 0, times 0 [ 841.618842] CPU: 1 PID: 6852 Comm: syz-executor.3 Not tainted 5.10.242 #1 [ 841.620422] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 841.622346] Call Trace: [ 841.622974] dump_stack+0x107/0x167 [ 841.623822] should_fail.cold+0x5/0xa [ 841.624705] ? getname_flags.part.0+0x50/0x4f0 [ 841.625762] should_failslab+0x5/0x20 [ 841.626643] kmem_cache_alloc+0x5b/0x310 [ 841.627599] getname_flags.part.0+0x50/0x4f0 [ 841.628625] getname_flags+0x9a/0xe0 [ 841.629490] __x64_sys_rename+0x56/0xa0 [ 841.630413] do_syscall_64+0x33/0x40 [ 841.631291] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 841.632477] RIP: 0033:0x7f55a12d3b19 01:08:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') [ 841.633337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 841.637750] RSP: 002b:00007f559e828188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 841.639519] RAX: ffffffffffffffda RBX: 00007f55a13e7020 RCX: 00007f55a12d3b19 [ 841.641173] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 841.642834] RBP: 00007f559e8281d0 R08: 0000000000000000 R09: 0000000000000000 [ 841.644488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 841.646140] R13: 00007ffde9396a2f R14: 00007f559e828300 R15: 0000000000022000 [ 841.666242] loop5: detected capacity change from 0 to 41948160 [ 841.709178] loop2: detected capacity change from 0 to 41948160 [ 841.715036] loop4: detected capacity change from 0 to 41948160 01:08:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 01:08:48 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 3) 01:08:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 2) [ 841.763638] loop1: detected capacity change from 0 to 41948160 [ 841.840556] loop4: detected capacity change from 0 to 41948160 [ 841.846714] loop6: detected capacity change from 0 to 41948160 [ 841.856046] FAULT_INJECTION: forcing a failure. [ 841.856046] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 841.857544] CPU: 0 PID: 6872 Comm: syz-executor.6 Not tainted 5.10.242 #1 [ 841.858405] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 841.859450] Call Trace: [ 841.859786] dump_stack+0x107/0x167 [ 841.860241] should_fail.cold+0x5/0xa [ 841.860724] strncpy_from_user+0x34/0x470 [ 841.861250] getname_flags.part.0+0x95/0x4f0 [ 841.861812] getname_flags+0x9a/0xe0 [ 841.861975] loop3: detected capacity change from 0 to 41948160 [ 841.862288] __x64_sys_rename+0x56/0xa0 [ 841.864186] do_syscall_64+0x33/0x40 [ 841.864657] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 841.865308] RIP: 0033:0x7fae24b00b19 [ 841.865782] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 841.868125] RSP: 002b:00007fae22076188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 841.869087] RAX: ffffffffffffffda RBX: 00007fae24c13f60 RCX: 00007fae24b00b19 [ 841.870002] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 841.870911] RBP: 00007fae220761d0 R08: 0000000000000000 R09: 0000000000000000 [ 841.871809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 841.872712] R13: 00007ffca61ab64f R14: 00007fae22076300 R15: 0000000000022000 [ 841.895600] FAULT_INJECTION: forcing a failure. [ 841.895600] name failslab, interval 1, probability 0, space 0, times 0 [ 841.897099] CPU: 0 PID: 6873 Comm: syz-executor.3 Not tainted 5.10.242 #1 [ 841.897953] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 841.898998] Call Trace: [ 841.899329] dump_stack+0x107/0x167 [ 841.899786] should_fail.cold+0x5/0xa [ 841.900272] ? create_object.isra.0+0x3a/0xa30 [ 841.900843] should_failslab+0x5/0x20 [ 841.901321] kmem_cache_alloc+0x5b/0x310 [ 841.901832] create_object.isra.0+0x3a/0xa30 [ 841.902380] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 841.903023] kmem_cache_alloc+0x159/0x310 [ 841.903544] getname_flags.part.0+0x50/0x4f0 [ 841.904094] getname_flags+0x9a/0xe0 [ 841.904561] __x64_sys_rename+0x56/0xa0 [ 841.905060] do_syscall_64+0x33/0x40 [ 841.905525] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 841.906165] RIP: 0033:0x7f55a12d3b19 [ 841.906630] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 841.908982] RSP: 002b:00007f559e849188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 841.909949] RAX: ffffffffffffffda RBX: 00007f55a13e6f60 RCX: 00007f55a12d3b19 [ 841.910861] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 841.911767] RBP: 00007f559e8491d0 R08: 0000000000000000 R09: 0000000000000000 [ 841.912613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 841.913516] R13: 00007ffde9396a2f R14: 00007f559e849300 R15: 0000000000022000 01:09:02 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 18) 01:09:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 3) 01:09:02 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:09:02 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 01:09:02 executing program 7: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="ff0700"/12]) creat(0x0, 0x191) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff7}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000003c0)={0x80000001, 0x0, 0x0, 0xd1}, 0x14) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$BTRFS_IOC_RM_DEV(r0, 0x5000940b, &(0x7f0000000200)={{r1}, "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"}) r2 = creat(&(0x7f0000001680)='./file0/file0\x00', 0x0) pwrite64(r2, &(0x7f0000000140)="b2", 0x20000141, 0x8001) 01:09:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 01:09:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:09:02 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 4) [ 855.848066] loop2: detected capacity change from 0 to 41948160 [ 855.849233] tmpfs: Unknown parameter 'ÿ' [ 855.857617] loop6: detected capacity change from 0 to 41948160 [ 855.867913] loop5: detected capacity change from 0 to 41948160 [ 855.871252] FAULT_INJECTION: forcing a failure. [ 855.871252] name failslab, interval 1, probability 0, space 0, times 0 [ 855.874155] CPU: 0 PID: 6898 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 855.875853] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 855.877898] Call Trace: [ 855.878558] dump_stack+0x107/0x167 [ 855.879468] should_fail.cold+0x5/0xa [ 855.880408] should_failslab+0x5/0x20 [ 855.881355] __kmalloc_track_caller+0x79/0x370 [ 855.882478] ? v9fs_session_init+0xe9/0x1680 [ 855.883574] ? kernel_text_address+0xf2/0x120 [ 855.884685] kstrdup+0x36/0x70 [ 855.885478] v9fs_session_init+0xe9/0x1680 [ 855.886528] ? lock_release+0x680/0x680 [ 855.887518] ? find_held_lock+0x2c/0x110 [ 855.888529] ? kmem_cache_alloc_trace+0x151/0x320 [ 855.889713] ? v9fs_show_options+0x690/0x690 [ 855.890804] ? trace_hardirqs_on+0x5b/0x180 [ 855.891886] ? kasan_unpoison_shadow+0x33/0x50 [ 855.893008] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 855.894256] v9fs_mount+0x79/0x8f0 [ 855.895134] ? v9fs_write_inode+0x60/0x60 [ 855.896153] legacy_get_tree+0x105/0x220 [ 855.897169] vfs_get_tree+0x8e/0x300 [ 855.898085] path_mount+0x1490/0x21e0 [ 855.899043] ? strncpy_from_user+0x9e/0x470 [ 855.900093] ? finish_automount+0xa90/0xa90 [ 855.901122] ? getname_flags.part.0+0x1dd/0x4f0 [ 855.902254] ? _copy_from_user+0xfb/0x1b0 [ 855.903264] __x64_sys_mount+0x282/0x300 [ 855.904260] ? copy_mnt_ns+0xa00/0xa00 [ 855.905221] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 855.906519] ? syscall_enter_from_user_mode+0x1d/0x50 [ 855.907806] do_syscall_64+0x33/0x40 [ 855.908716] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 855.909964] RIP: 0033:0x7f42b2db2b19 [ 855.910880] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 855.915352] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 855.917204] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 855.918975] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 855.920739] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 855.922524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 855.924301] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 855.940326] loop3: detected capacity change from 0 to 41948160 [ 855.960406] FAULT_INJECTION: forcing a failure. [ 855.960406] name failslab, interval 1, probability 0, space 0, times 0 [ 855.963339] CPU: 0 PID: 6911 Comm: syz-executor.6 Not tainted 5.10.242 #1 [ 855.965020] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 855.967057] Call Trace: [ 855.967705] dump_stack+0x107/0x167 [ 855.968602] should_fail.cold+0x5/0xa [ 855.969541] ? getname_flags.part.0+0x50/0x4f0 [ 855.970651] should_failslab+0x5/0x20 [ 855.971585] kmem_cache_alloc+0x5b/0x310 [ 855.972566] ? strncpy_from_user+0x9e/0x470 [ 855.973620] getname_flags.part.0+0x50/0x4f0 [ 855.974686] getname_flags+0x9a/0xe0 [ 855.975603] __x64_sys_rename+0x65/0xa0 [ 855.976564] do_syscall_64+0x33/0x40 [ 855.977466] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 855.978704] RIP: 0033:0x7fae24b00b19 [ 855.979612] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 855.984082] RSP: 002b:00007fae22055188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 855.985935] RAX: ffffffffffffffda RBX: 00007fae24c14020 RCX: 00007fae24b00b19 [ 855.987677] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 855.989416] RBP: 00007fae220551d0 R08: 0000000000000000 R09: 0000000000000000 [ 855.991170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 855.992904] R13: 00007ffca61ab64f R14: 00007fae22055300 R15: 0000000000022000 [ 855.997599] FAULT_INJECTION: forcing a failure. [ 855.997599] name fail_usercopy, interval 1, probability 0, space 0, times 0 01:09:02 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 19) [ 856.000517] CPU: 0 PID: 6907 Comm: syz-executor.3 Not tainted 5.10.242 #1 [ 856.002397] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 856.004422] Call Trace: [ 856.005061] dump_stack+0x107/0x167 [ 856.005954] should_fail.cold+0x5/0xa [ 856.006891] strncpy_from_user+0x34/0x470 [ 856.007920] getname_flags.part.0+0x95/0x4f0 [ 856.009001] getname_flags+0x9a/0xe0 [ 856.009923] __x64_sys_rename+0x56/0xa0 [ 856.010896] do_syscall_64+0x33/0x40 [ 856.011826] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 856.013068] RIP: 0033:0x7f55a12d3b19 [ 856.013965] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 856.018480] RSP: 002b:00007f559e828188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 856.020353] RAX: ffffffffffffffda RBX: 00007f55a13e7020 RCX: 00007f55a12d3b19 [ 856.022095] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 856.023843] RBP: 00007f559e8281d0 R08: 0000000000000000 R09: 0000000000000000 [ 856.025587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 856.027344] R13: 00007ffde9396a2f R14: 00007f559e828300 R15: 0000000000022000 [ 856.030670] loop1: detected capacity change from 0 to 41948160 [ 856.051020] loop4: detected capacity change from 0 to 41948160 [ 856.223611] FAULT_INJECTION: forcing a failure. [ 856.223611] name failslab, interval 1, probability 0, space 0, times 0 [ 856.226229] CPU: 1 PID: 6918 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 856.227800] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 856.229715] Call Trace: [ 856.230327] dump_stack+0x107/0x167 [ 856.231165] should_fail.cold+0x5/0xa [ 856.232036] ? create_object.isra.0+0x3a/0xa30 [ 856.233071] should_failslab+0x5/0x20 [ 856.233931] kmem_cache_alloc+0x5b/0x310 [ 856.234859] create_object.isra.0+0x3a/0xa30 [ 856.235865] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 856.237031] __kmalloc_track_caller+0x177/0x370 [ 856.238098] ? v9fs_session_init+0xe9/0x1680 [ 856.239114] ? kernel_text_address+0xf2/0x120 [ 856.240156] kstrdup+0x36/0x70 [ 856.240901] v9fs_session_init+0xe9/0x1680 [ 856.241880] ? lock_release+0x680/0x680 [ 856.242791] ? find_held_lock+0x2c/0x110 [ 856.243745] ? kmem_cache_alloc_trace+0x151/0x320 [ 856.244845] ? v9fs_show_options+0x690/0x690 [ 856.245866] ? trace_hardirqs_on+0x5b/0x180 [ 856.246851] ? kasan_unpoison_shadow+0x33/0x50 [ 856.247899] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 856.249057] v9fs_mount+0x79/0x8f0 [ 856.249875] ? v9fs_write_inode+0x60/0x60 [ 856.250815] legacy_get_tree+0x105/0x220 [ 856.251749] vfs_get_tree+0x8e/0x300 [ 856.252605] path_mount+0x1490/0x21e0 [ 856.253488] ? strncpy_from_user+0x9e/0x470 [ 856.254478] ? finish_automount+0xa90/0xa90 [ 856.255478] ? getname_flags.part.0+0x1dd/0x4f0 [ 856.256552] ? _copy_from_user+0xfb/0x1b0 [ 856.257519] __x64_sys_mount+0x282/0x300 [ 856.258439] ? copy_mnt_ns+0xa00/0xa00 [ 856.259351] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 856.260546] ? syscall_enter_from_user_mode+0x1d/0x50 [ 856.261731] do_syscall_64+0x33/0x40 [ 856.262595] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 856.263774] RIP: 0033:0x7f42b2db2b19 [ 856.264642] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 856.268859] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 856.270624] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 856.272277] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 856.273926] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 856.275552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 856.277199] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 856.668606] tmpfs: Unknown parameter 'ÿ' 01:09:20 executing program 7: setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x100) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000340)={0x1, 0x81, 0x0, 0x6, 0x5}) readv(0xffffffffffffffff, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x4000) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x25, &(0x7f00000002c0), 0x4) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='net/snmp\x00') writev(r0, &(0x7f0000000100)=[{&(0x7f0000000240)="6a464d13fa21ccf757f2ddec5aaa866216310008eb58f7fe05866730a289f29261ea75aaa5056a64a979231c7a09c72ad01367d45059b5e79a3c60684004c9f93bf5481bcdeea31610b25af20d0f31a7a8a62de07ed349f690303e7c78e67eaf8ee68524a7d7eb214b28dca461c6257c3a2906a2a81053c676fbd308711fd791", 0x80}, {&(0x7f0000000040)="894aaa139866fea6b87ea5b41ff356e63d96c5", 0x13}], 0x2) preadv(r2, &(0x7f0000002400)=[{&(0x7f0000000140)=""/203, 0xcb}], 0x1, 0x7ff, 0x0) ioctl$KDENABIO(r2, 0x4b36) fdatasync(0xffffffffffffffff) poll(&(0x7f0000000140), 0x0, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0xfffffffffffffff9) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_int(r3, 0x1, 0x2a, &(0x7f0000000640), &(0x7f0000000680)=0x4) ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f00000000c0)) unshare(0x48020200) 01:09:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:09:20 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 20) 01:09:20 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:09:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 01:09:20 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 5) 01:09:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 4) 01:09:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 1) [ 873.174174] FAULT_INJECTION: forcing a failure. [ 873.174174] name failslab, interval 1, probability 0, space 0, times 0 [ 873.177507] CPU: 0 PID: 6928 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 873.179410] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 873.181735] Call Trace: [ 873.182481] dump_stack+0x107/0x167 [ 873.183517] should_fail.cold+0x5/0xa [ 873.184594] ? p9_client_create+0xaf/0x1230 [ 873.185912] should_failslab+0x5/0x20 [ 873.186951] kmem_cache_alloc_trace+0x55/0x320 [ 873.188215] ? find_held_lock+0x2c/0x110 [ 873.188866] loop4: detected capacity change from 0 to 41948160 [ 873.189333] p9_client_create+0xaf/0x1230 [ 873.189357] ? lock_downgrade+0x6d0/0x6d0 [ 873.189394] ? p9_client_flush+0x430/0x430 [ 873.194019] ? trace_hardirqs_on+0x5b/0x180 [ 873.195245] ? lockdep_init_map_type+0x2c7/0x780 [ 873.196361] ? __raw_spin_lock_init+0x36/0x110 [ 873.197403] v9fs_session_init+0x1dd/0x1680 [ 873.198381] ? lock_release+0x680/0x680 [ 873.199322] ? kmem_cache_alloc_trace+0x151/0x320 [ 873.200425] ? v9fs_show_options+0x690/0x690 [ 873.201443] ? trace_hardirqs_on+0x5b/0x180 [ 873.202420] ? kasan_unpoison_shadow+0x33/0x50 [ 873.203479] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 873.204640] v9fs_mount+0x79/0x8f0 [ 873.205458] ? v9fs_write_inode+0x60/0x60 [ 873.206409] legacy_get_tree+0x105/0x220 [ 873.207353] vfs_get_tree+0x8e/0x300 [ 873.208221] path_mount+0x1490/0x21e0 [ 873.209115] ? strncpy_from_user+0x9e/0x470 [ 873.210109] ? finish_automount+0xa90/0xa90 [ 873.211097] ? getname_flags.part.0+0x1dd/0x4f0 [ 873.212212] ? _copy_from_user+0xfb/0x1b0 [ 873.213169] __x64_sys_mount+0x282/0x300 [ 873.214119] ? copy_mnt_ns+0xa00/0xa00 [ 873.215012] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 873.216240] ? syscall_enter_from_user_mode+0x1d/0x50 [ 873.217411] do_syscall_64+0x33/0x40 [ 873.218270] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 873.219515] RIP: 0033:0x7f42b2db2b19 [ 873.220381] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 873.225089] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 873.226859] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 873.228527] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 873.230192] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 873.231823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 873.233441] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 873.241532] loop6: detected capacity change from 0 to 41948160 [ 873.248374] loop5: detected capacity change from 0 to 41948160 [ 873.255467] loop2: detected capacity change from 0 to 41948160 [ 873.261426] loop3: detected capacity change from 0 to 41948160 [ 873.269456] loop1: detected capacity change from 0 to 41948160 [ 873.303585] FAULT_INJECTION: forcing a failure. [ 873.303585] name failslab, interval 1, probability 0, space 0, times 0 [ 873.306191] CPU: 0 PID: 6937 Comm: syz-executor.6 Not tainted 5.10.242 #1 [ 873.307783] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 873.309682] Call Trace: [ 873.310296] dump_stack+0x107/0x167 [ 873.311151] should_fail.cold+0x5/0xa [ 873.312031] ? create_object.isra.0+0x3a/0xa30 [ 873.313069] should_failslab+0x5/0x20 [ 873.313935] kmem_cache_alloc+0x5b/0x310 [ 873.314875] create_object.isra.0+0x3a/0xa30 [ 873.315909] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 873.317065] kmem_cache_alloc+0x159/0x310 [ 873.318034] ? strncpy_from_user+0x9e/0x470 [ 873.319034] getname_flags.part.0+0x50/0x4f0 [ 873.320077] getname_flags+0x9a/0xe0 [ 873.320926] __x64_sys_rename+0x65/0xa0 [ 873.321826] do_syscall_64+0x33/0x40 [ 873.322694] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 873.323878] RIP: 0033:0x7fae24b00b19 [ 873.324724] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 873.328883] RSP: 002b:00007fae22076188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 873.330612] RAX: ffffffffffffffda RBX: 00007fae24c13f60 RCX: 00007fae24b00b19 [ 873.332310] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 873.334398] RBP: 00007fae220761d0 R08: 0000000000000000 R09: 0000000000000000 [ 873.336525] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 873.338286] R13: 00007ffca61ab64f R14: 00007fae22076300 R15: 0000000000022000 [ 873.338347] FAULT_INJECTION: forcing a failure. [ 873.338347] name failslab, interval 1, probability 0, space 0, times 0 [ 873.340747] FAULT_INJECTION: forcing a failure. [ 873.340747] name failslab, interval 1, probability 0, space 0, times 0 [ 873.342441] CPU: 1 PID: 6938 Comm: syz-executor.5 Not tainted 5.10.242 #1 [ 873.346256] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 873.347960] Call Trace: [ 873.348511] dump_stack+0x107/0x167 [ 873.349295] should_fail.cold+0x5/0xa [ 873.350123] ? getname_flags.part.0+0x50/0x4f0 [ 873.351094] should_failslab+0x5/0x20 [ 873.352006] kmem_cache_alloc+0x5b/0x310 [ 873.352905] getname_flags.part.0+0x50/0x4f0 [ 873.353896] getname_flags+0x9a/0xe0 [ 873.354670] __x64_sys_rename+0x56/0xa0 [ 873.355524] do_syscall_64+0x33/0x40 [ 873.356274] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 873.357349] RIP: 0033:0x7fa96fa17b19 [ 873.358108] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 873.362056] RSP: 002b:00007fa96cf8d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 873.363629] RAX: ffffffffffffffda RBX: 00007fa96fb2af60 RCX: 00007fa96fa17b19 [ 873.365161] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 873.366757] RBP: 00007fa96cf8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 873.368239] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 873.369692] R13: 00007fffc4cfcc4f R14: 00007fa96cf8d300 R15: 0000000000022000 [ 873.371213] CPU: 0 PID: 6941 Comm: syz-executor.3 Not tainted 5.10.242 #1 [ 873.372785] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 873.374705] Call Trace: [ 873.375331] dump_stack+0x107/0x167 [ 873.376169] should_fail.cold+0x5/0xa [ 873.377036] ? getname_flags.part.0+0x50/0x4f0 [ 873.378116] should_failslab+0x5/0x20 [ 873.379019] kmem_cache_alloc+0x5b/0x310 [ 873.379967] ? strncpy_from_user+0x9e/0x470 [ 873.380965] getname_flags.part.0+0x50/0x4f0 [ 873.381973] getname_flags+0x9a/0xe0 [ 873.382820] __x64_sys_rename+0x65/0xa0 [ 873.383737] do_syscall_64+0x33/0x40 [ 873.384588] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 873.385756] RIP: 0033:0x7f55a12d3b19 [ 873.386637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 873.390841] RSP: 002b:00007f559e849188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 873.392584] RAX: ffffffffffffffda RBX: 00007f55a13e6f60 RCX: 00007f55a12d3b19 [ 873.394179] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 873.395785] RBP: 00007f559e8491d0 R08: 0000000000000000 R09: 0000000000000000 [ 873.397422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 873.399053] R13: 00007ffde9396a2f R14: 00007f559e849300 R15: 0000000000022000 01:09:20 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 21) 01:09:20 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 01:09:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 1) 01:09:20 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 6) 01:09:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:09:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 5) [ 873.521210] FAULT_INJECTION: forcing a failure. [ 873.521210] name failslab, interval 1, probability 0, space 0, times 0 [ 873.523611] CPU: 1 PID: 6960 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 873.525019] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 873.526699] Call Trace: [ 873.527265] dump_stack+0x107/0x167 [ 873.528016] should_fail.cold+0x5/0xa [ 873.528795] ? create_object.isra.0+0x3a/0xa30 [ 873.529727] should_failslab+0x5/0x20 [ 873.530508] kmem_cache_alloc+0x5b/0x310 [ 873.531358] ? kernel_text_address+0xf2/0x120 [ 873.532285] create_object.isra.0+0x3a/0xa30 [ 873.533184] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 873.534227] kmem_cache_alloc_trace+0x151/0x320 [ 873.535195] ? find_held_lock+0x2c/0x110 [ 873.536036] p9_client_create+0xaf/0x1230 [ 873.536880] ? lock_downgrade+0x6d0/0x6d0 [ 873.537741] ? p9_client_flush+0x430/0x430 [ 873.538610] ? trace_hardirqs_on+0x5b/0x180 [ 873.539512] ? lockdep_init_map_type+0x2c7/0x780 [ 873.540484] ? __raw_spin_lock_init+0x36/0x110 [ 873.541444] v9fs_session_init+0x1dd/0x1680 [ 873.542327] ? lock_release+0x680/0x680 [ 873.543168] ? kmem_cache_alloc_trace+0x151/0x320 [ 873.544157] ? v9fs_show_options+0x690/0x690 [ 873.545064] ? trace_hardirqs_on+0x5b/0x180 [ 873.545944] ? kasan_unpoison_shadow+0x33/0x50 [ 873.546874] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 873.547921] v9fs_mount+0x79/0x8f0 [ 873.548653] ? v9fs_write_inode+0x60/0x60 [ 873.549504] legacy_get_tree+0x105/0x220 [ 873.550333] vfs_get_tree+0x8e/0x300 [ 873.551097] path_mount+0x1490/0x21e0 [ 873.551911] ? strncpy_from_user+0x9e/0x470 [ 873.552784] ? finish_automount+0xa90/0xa90 [ 873.553668] ? getname_flags.part.0+0x1dd/0x4f0 [ 873.554623] ? _copy_from_user+0xfb/0x1b0 [ 873.555495] __x64_sys_mount+0x282/0x300 [ 873.556333] ? copy_mnt_ns+0xa00/0xa00 [ 873.557144] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 873.558232] ? syscall_enter_from_user_mode+0x1d/0x50 [ 873.559311] do_syscall_64+0x33/0x40 [ 873.560079] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 873.561140] RIP: 0033:0x7f42b2db2b19 [ 873.561906] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 873.565624] FAULT_INJECTION: forcing a failure. [ 873.565624] name failslab, interval 1, probability 0, space 0, times 0 [ 873.565684] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 873.569763] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 873.571240] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 873.572689] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 873.574146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 873.575611] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 873.577117] CPU: 0 PID: 6959 Comm: syz-executor.4 Not tainted 5.10.242 #1 [ 873.578684] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 873.580598] Call Trace: [ 873.581208] dump_stack+0x107/0x167 [ 873.582043] should_fail.cold+0x5/0xa [ 873.582915] ? getname_flags.part.0+0x50/0x4f0 [ 873.583969] should_failslab+0x5/0x20 [ 873.584838] kmem_cache_alloc+0x5b/0x310 [ 873.585758] getname_flags.part.0+0x50/0x4f0 [ 873.586763] getname_flags+0x9a/0xe0 [ 873.587626] __x64_sys_rename+0x56/0xa0 [ 873.588543] do_syscall_64+0x33/0x40 [ 873.589410] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 873.590588] RIP: 0033:0x7f17f2c8cb19 [ 873.591435] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 873.595629] RSP: 002b:00007f17f0202188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 873.597366] RAX: ffffffffffffffda RBX: 00007f17f2d9ff60 RCX: 00007f17f2c8cb19 [ 873.599022] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 873.600665] RBP: 00007f17f02021d0 R08: 0000000000000000 R09: 0000000000000000 [ 873.602285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 873.603913] R13: 00007ffcb391048f R14: 00007f17f0202300 R15: 0000000000022000 [ 873.607573] loop2: detected capacity change from 0 to 41948160 01:09:20 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) sync() r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="21130c04f557d50c2ef6628085b4f0ca3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x4, 0x4, 0x1, 0x0, 0x10000000, 0x12c40, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000040), 0x3}, 0x4001, 0x80000001, 0x1, 0x0, 0x80000001, 0x59c, 0x4, 0x0, 0x6, 0x0, 0x4}, 0xffffffffffffffff, 0xe, r0, 0x8) r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000003c0)={0xa, &(0x7f0000000340)=[{0x3ff, 0x1, 0x40, 0x7fff}, {0x101, 0x80, 0x1, 0x10000}, {0x23d, 0x40, 0x2c, 0x5}, {0xff, 0xe0, 0x3f, 0x3f}, {0xb1e, 0x4, 0x7, 0x4}, {0x5, 0x81, 0x0, 0x2}, {0x2, 0x99, 0x1, 0x7fffffff}, {0x0, 0x4, 0x2, 0x5}, {0x1, 0x0, 0x1, 0x7f}, {0x8, 0x1, 0x2, 0x3}]}) io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000200)="b8d50de92d6b140a31fb681524c1f9aeb4bd283d0eb1403f9324f22843159e60f3a76719feff31650c24db2ec80ffb46f449ab002e55b497da957d7f60a8fc08a4be5e20238530779afdca8156baa37dea4f76f4d737d2841b904d3ca1de37e949283ed10d2597432b589212248f19c368b0c136f65af09d83c5dc82b50d14f357bb8c4649fb5be6f22d72a8ff4f8a8a97b95a267cedbe2fe200f4433eaace32ca9b3ade6f177c3dc12349dfc749ce3d90b1e17b4b1e7958316655dee110d595c6f51cf6ba365554177d09f605966507d6f047b5d67a54b2e8933842f965f8285924d617f15e316c95", 0xe9, 0x2, 0x0, 0x2, r0}]) 01:09:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 2) [ 873.686179] loop6: detected capacity change from 0 to 41948160 [ 873.708600] loop1: detected capacity change from 0 to 41948160 [ 873.736619] loop3: detected capacity change from 0 to 41948160 [ 873.763568] FAULT_INJECTION: forcing a failure. [ 873.763568] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 873.766055] CPU: 1 PID: 6978 Comm: syz-executor.6 Not tainted 5.10.242 #1 [ 873.767489] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 873.769259] Call Trace: [ 873.769832] dump_stack+0x107/0x167 [ 873.770598] should_fail.cold+0x5/0xa [ 873.771422] strncpy_from_user+0x34/0x470 [ 873.772317] getname_flags.part.0+0x95/0x4f0 [ 873.773234] getname_flags+0x9a/0xe0 [ 873.774031] __x64_sys_rename+0x65/0xa0 [ 873.774852] do_syscall_64+0x33/0x40 [ 873.775626] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 873.776686] RIP: 0033:0x7fae24b00b19 [ 873.777442] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 873.781257] RSP: 002b:00007fae22055188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 873.782836] RAX: ffffffffffffffda RBX: 00007fae24c14020 RCX: 00007fae24b00b19 [ 873.784316] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 873.785787] RBP: 00007fae220551d0 R08: 0000000000000000 R09: 0000000000000000 [ 873.787263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 873.788715] R13: 00007ffca61ab64f R14: 00007fae22055300 R15: 0000000000022000 [ 873.807689] loop5: detected capacity change from 0 to 41948160 01:09:20 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') [ 873.843893] FAULT_INJECTION: forcing a failure. [ 873.843893] name failslab, interval 1, probability 0, space 0, times 0 [ 873.848323] CPU: 1 PID: 6983 Comm: syz-executor.3 Not tainted 5.10.242 #1 [ 873.849741] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 873.851469] Call Trace: [ 873.852012] dump_stack+0x107/0x167 [ 873.852772] should_fail.cold+0x5/0xa [ 873.853554] ? create_object.isra.0+0x3a/0xa30 [ 873.854509] should_failslab+0x5/0x20 [ 873.855312] kmem_cache_alloc+0x5b/0x310 [ 873.856173] create_object.isra.0+0x3a/0xa30 [ 873.857074] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 873.858158] kmem_cache_alloc+0x159/0x310 [ 873.859008] ? strncpy_from_user+0x9e/0x470 [ 873.859914] getname_flags.part.0+0x50/0x4f0 [ 873.860825] getname_flags+0x9a/0xe0 [ 873.861603] __x64_sys_rename+0x65/0xa0 [ 873.862422] do_syscall_64+0x33/0x40 [ 873.863194] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 873.864245] RIP: 0033:0x7f55a12d3b19 [ 873.865013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 873.868803] RSP: 002b:00007f559e828188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 873.870367] RAX: ffffffffffffffda RBX: 00007f55a13e7020 RCX: 00007f55a12d3b19 [ 873.871837] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 873.873323] RBP: 00007f559e8281d0 R08: 0000000000000000 R09: 0000000000000000 [ 873.874799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 873.876269] R13: 00007ffde9396a2f R14: 00007f559e828300 R15: 0000000000022000 [ 873.896484] FAULT_INJECTION: forcing a failure. [ 873.896484] name failslab, interval 1, probability 0, space 0, times 0 [ 873.899157] CPU: 0 PID: 6981 Comm: syz-executor.5 Not tainted 5.10.242 #1 [ 873.900727] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 873.902754] Call Trace: [ 873.903397] dump_stack+0x107/0x167 [ 873.904249] should_fail.cold+0x5/0xa [ 873.905138] ? create_object.isra.0+0x3a/0xa30 [ 873.906192] should_failslab+0x5/0x20 [ 873.907079] kmem_cache_alloc+0x5b/0x310 [ 873.908033] create_object.isra.0+0x3a/0xa30 [ 873.909052] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 873.910226] kmem_cache_alloc+0x159/0x310 [ 873.911211] getname_flags.part.0+0x50/0x4f0 [ 873.912235] getname_flags+0x9a/0xe0 [ 873.913085] __x64_sys_rename+0x56/0xa0 [ 873.913995] do_syscall_64+0x33/0x40 [ 873.914850] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 873.916039] RIP: 0033:0x7fa96fa17b19 [ 873.916895] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 873.921130] RSP: 002b:00007fa96cf8d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 873.922871] RAX: ffffffffffffffda RBX: 00007fa96fb2af60 RCX: 00007fa96fa17b19 [ 873.924510] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 873.926131] RBP: 00007fa96cf8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 873.927765] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 873.929387] R13: 00007fffc4cfcc4f R14: 00007fa96cf8d300 R15: 0000000000022000 [ 873.937032] loop2: detected capacity change from 0 to 41948160 01:09:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 01:09:20 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 22) 01:09:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 3) 01:09:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 2) [ 874.003557] audit: type=1326 audit(1757293760.977:57): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6968 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68a8d15b19 code=0x7ffc0000 [ 874.008339] audit: type=1326 audit(1757293760.977:58): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6968 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68a8d15b19 code=0x7ffc0000 [ 874.030873] FAULT_INJECTION: forcing a failure. [ 874.030873] name failslab, interval 1, probability 0, space 0, times 0 [ 874.032875] FAULT_INJECTION: forcing a failure. [ 874.032875] name failslab, interval 1, probability 0, space 0, times 0 [ 874.033795] CPU: 0 PID: 6992 Comm: syz-executor.4 Not tainted 5.10.242 #1 [ 874.037325] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 874.039187] Call Trace: [ 874.039772] dump_stack+0x107/0x167 [ 874.040581] should_fail.cold+0x5/0xa [ 874.041427] ? create_object.isra.0+0x3a/0xa30 [ 874.042435] should_failslab+0x5/0x20 [ 874.043305] kmem_cache_alloc+0x5b/0x310 [ 874.044205] create_object.isra.0+0x3a/0xa30 [ 874.045184] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 874.046330] kmem_cache_alloc+0x159/0x310 [ 874.047269] getname_flags.part.0+0x50/0x4f0 [ 874.048257] getname_flags+0x9a/0xe0 [ 874.049088] __x64_sys_rename+0x56/0xa0 [ 874.049972] do_syscall_64+0x33/0x40 [ 874.050811] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 874.051967] RIP: 0033:0x7f17f2c8cb19 [ 874.052795] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 874.056900] RSP: 002b:00007f17f0202188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 874.058601] RAX: ffffffffffffffda RBX: 00007f17f2d9ff60 RCX: 00007f17f2c8cb19 [ 874.060208] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 874.061789] RBP: 00007f17f02021d0 R08: 0000000000000000 R09: 0000000000000000 [ 874.063391] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 874.064975] R13: 00007ffcb391048f R14: 00007f17f0202300 R15: 0000000000022000 [ 874.066595] CPU: 1 PID: 6989 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 874.068034] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 874.069737] Call Trace: [ 874.070294] dump_stack+0x107/0x167 [ 874.071045] should_fail.cold+0x5/0xa [ 874.071831] should_failslab+0x5/0x20 [ 874.072620] __kmalloc_track_caller+0x79/0x370 [ 874.073565] ? p9_client_create+0x41d/0x1230 [ 874.074478] kstrdup+0x36/0x70 [ 874.075148] p9_client_create+0x41d/0x1230 [ 874.076023] ? lock_downgrade+0x6d0/0x6d0 [ 874.076885] ? p9_client_flush+0x430/0x430 [ 874.077759] ? trace_hardirqs_on+0x5b/0x180 [ 874.078729] ? lockdep_init_map_type+0x2c7/0x780 [ 874.079762] ? __raw_spin_lock_init+0x36/0x110 [ 874.080709] v9fs_session_init+0x1dd/0x1680 [ 874.081611] ? lock_release+0x680/0x680 [ 874.082488] ? kmem_cache_alloc_trace+0x151/0x320 [ 874.083505] ? v9fs_show_options+0x690/0x690 [ 874.084422] ? trace_hardirqs_on+0x5b/0x180 [ 874.085307] ? kasan_unpoison_shadow+0x33/0x50 [ 874.086261] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 874.087346] v9fs_mount+0x79/0x8f0 [ 874.088084] ? v9fs_write_inode+0x60/0x60 [ 874.088932] legacy_get_tree+0x105/0x220 [ 874.089765] vfs_get_tree+0x8e/0x300 [ 874.090532] path_mount+0x1490/0x21e0 [ 874.091336] ? strncpy_from_user+0x9e/0x470 [ 874.092214] ? finish_automount+0xa90/0xa90 [ 874.093092] ? getname_flags.part.0+0x1dd/0x4f0 [ 874.094038] ? _copy_from_user+0xfb/0x1b0 [ 874.094890] __x64_sys_mount+0x282/0x300 [ 874.095733] ? copy_mnt_ns+0xa00/0xa00 [ 874.096531] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 874.097609] ? syscall_enter_from_user_mode+0x1d/0x50 [ 874.098662] do_syscall_64+0x33/0x40 [ 874.099435] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 874.100485] RIP: 0033:0x7f42b2db2b19 [ 874.101240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 874.104998] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 874.106549] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 874.108016] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 874.109476] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 874.110945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 874.112410] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 01:09:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 3) [ 874.141080] audit: type=1326 audit(1757293761.114:59): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6968 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=209 compat=0 ip=0x7f68a8d15b19 code=0x7ffc0000 01:09:21 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 7) [ 874.153507] loop1: detected capacity change from 0 to 41948160 [ 874.157335] audit: type=1326 audit(1757293761.114:60): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6968 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68a8d15b19 code=0x7ffc0000 [ 874.166428] loop5: detected capacity change from 0 to 41948160 [ 874.188611] audit: type=1326 audit(1757293761.115:61): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6968 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68a8d15b19 code=0x7ffc0000 [ 874.193998] FAULT_INJECTION: forcing a failure. [ 874.193998] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 874.196789] CPU: 1 PID: 6998 Comm: syz-executor.5 Not tainted 5.10.242 #1 [ 874.198523] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 874.200655] Call Trace: [ 874.201328] dump_stack+0x107/0x167 [ 874.202262] should_fail.cold+0x5/0xa [ 874.203270] strncpy_from_user+0x34/0x470 [ 874.204373] getname_flags.part.0+0x95/0x4f0 [ 874.205304] getname_flags+0x9a/0xe0 [ 874.206101] __x64_sys_rename+0x56/0xa0 [ 874.206912] do_syscall_64+0x33/0x40 [ 874.207721] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 874.208771] RIP: 0033:0x7fa96fa17b19 [ 874.209558] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 874.213309] RSP: 002b:00007fa96cf8d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 874.214991] RAX: ffffffffffffffda RBX: 00007fa96fb2af60 RCX: 00007fa96fa17b19 [ 874.216627] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 874.218181] RBP: 00007fa96cf8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 874.219778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 874.221288] R13: 00007fffc4cfcc4f R14: 00007fa96cf8d300 R15: 0000000000022000 [ 874.242173] audit: type=1326 audit(1757293761.215:62): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6968 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7f68a8d15b19 code=0x7ffc0000 [ 874.247148] audit: type=1326 audit(1757293761.216:63): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6968 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68a8d15b19 code=0x7ffc0000 [ 874.259461] loop4: detected capacity change from 0 to 41948160 [ 874.278312] FAULT_INJECTION: forcing a failure. [ 874.278312] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 874.281351] CPU: 0 PID: 7004 Comm: syz-executor.4 Not tainted 5.10.242 #1 [ 874.282861] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 874.284654] Call Trace: [ 874.285214] dump_stack+0x107/0x167 [ 874.285963] should_fail.cold+0x5/0xa [ 874.286772] strncpy_from_user+0x34/0x470 [ 874.287647] getname_flags.part.0+0x95/0x4f0 [ 874.288568] getname_flags+0x9a/0xe0 [ 874.289311] __x64_sys_rename+0x56/0xa0 [ 874.290107] do_syscall_64+0x33/0x40 [ 874.290851] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 874.291908] RIP: 0033:0x7f17f2c8cb19 [ 874.292655] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 874.296342] RSP: 002b:00007f17f01e1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 874.297877] RAX: ffffffffffffffda RBX: 00007f17f2da0020 RCX: 00007f17f2c8cb19 [ 874.299319] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 874.300736] RBP: 00007f17f01e11d0 R08: 0000000000000000 R09: 0000000000000000 [ 874.302164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 874.303604] R13: 00007ffcb391048f R14: 00007f17f01e1300 R15: 0000000000022000 [ 874.322894] audit: type=1326 audit(1757293761.216:64): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6968 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68a8d15b19 code=0x7ffc0000 [ 874.358948] audit: type=1326 audit(1757293761.220:65): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6968 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=162 compat=0 ip=0x7f68a8d15b19 code=0x7ffc0000 [ 874.387536] loop6: detected capacity change from 0 to 41948160 [ 874.444371] FAULT_INJECTION: forcing a failure. [ 874.444371] name failslab, interval 1, probability 0, space 0, times 0 [ 874.446653] CPU: 0 PID: 7006 Comm: syz-executor.6 Not tainted 5.10.242 #1 [ 874.447882] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 874.449534] Call Trace: [ 874.450037] dump_stack+0x107/0x167 [ 874.450705] should_fail.cold+0x5/0xa [ 874.451427] ? jbd2__journal_start+0x190/0x7e0 [ 874.452270] should_failslab+0x5/0x20 [ 874.452976] kmem_cache_alloc+0x5b/0x310 [ 874.453725] ? ext4_dx_find_entry+0x600/0x600 [ 874.454556] jbd2__journal_start+0x190/0x7e0 [ 874.455372] __ext4_journal_start_sb+0x214/0x390 [ 874.456241] ext4_rename+0x96d/0x2bc0 [ 874.456932] ? ext4_tmpfile+0x440/0x440 [ 874.457664] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 874.458626] ? lock_acquire+0x197/0x470 [ 874.459352] ? vfs_rename+0xcb5/0x1510 [ 874.460056] ? lockref_get+0x11/0x50 [ 874.460721] ? find_held_lock+0x2c/0x110 [ 874.461455] ? down_write_nested+0xe4/0x160 [ 874.462233] ext4_rename2+0x1af/0x240 [ 874.462909] vfs_rename+0xd6c/0x1510 [ 874.463602] ? vfs_unlink+0x8b0/0x8b0 [ 874.464301] ? lookup_dcache+0x65/0x130 [ 874.465018] do_renameat2+0xae1/0xbf0 [ 874.465702] ? __ia32_sys_link+0x80/0x80 [ 874.466438] ? __virt_addr_valid+0x170/0x5d0 [ 874.467275] ? __check_object_size+0x319/0x440 [ 874.468110] __x64_sys_rename+0x7d/0xa0 [ 874.468830] do_syscall_64+0x33/0x40 [ 874.469488] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 874.470393] RIP: 0033:0x7fae24b00b19 [ 874.471052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 874.474324] RSP: 002b:00007fae22076188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 874.475690] RAX: ffffffffffffffda RBX: 00007fae24c13f60 RCX: 00007fae24b00b19 [ 874.476952] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 874.478207] RBP: 00007fae220761d0 R08: 0000000000000000 R09: 0000000000000000 [ 874.479480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 874.480752] R13: 00007ffca61ab64f R14: 00007fae22076300 R15: 0000000000022000 01:09:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 6) 01:09:36 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 23) 01:09:36 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x11010, 0x84b, 0xfffffffd}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r0 = getpid() perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0x3, 0x3, 0x0, 0x0, 0x0, 0x10000004, 0x1001c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x2, @perf_config_ext={0x10000000000001, 0x9}, 0x19a0, 0x1, 0x6, 0x0, 0x0, 0xa30, 0xd, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xf, 0xffffffffffffffff, 0x0) process_vm_readv(r0, &(0x7f00000004c0)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/231, 0xe7}, {&(0x7f0000000300)=""/53, 0x35}, {&(0x7f0000000340)=""/193, 0xc1}, {&(0x7f0000000440)=""/96, 0x60}], 0x6, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/141, 0x8d}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/4, 0x4}], 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000000c0)=0x4) pidfd_open(0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x4, 0x7, 0xff}) ptrace$peek(0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x80464c453f) connect$inet6(r1, &(0x7f0000000000)={0xa, 0xfff8, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, 0x1c) fork() syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)) 01:09:36 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 8) 01:09:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 4) 01:09:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 01:09:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 4) 01:09:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') [ 889.429787] loop3: detected capacity change from 0 to 41948160 [ 889.450383] loop5: detected capacity change from 0 to 41948160 [ 889.461183] loop1: detected capacity change from 0 to 41948160 [ 889.467077] loop6: detected capacity change from 0 to 41948160 [ 889.476024] loop4: detected capacity change from 0 to 41948160 [ 889.481365] FAULT_INJECTION: forcing a failure. [ 889.481365] name failslab, interval 1, probability 0, space 0, times 0 [ 889.483896] CPU: 1 PID: 7033 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 889.485378] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 889.487174] Call Trace: [ 889.487767] dump_stack+0x107/0x167 [ 889.488570] should_fail.cold+0x5/0xa [ 889.489411] ? create_object.isra.0+0x3a/0xa30 [ 889.490413] should_failslab+0x5/0x20 [ 889.491243] kmem_cache_alloc+0x5b/0x310 [ 889.492142] ? lock_downgrade+0x6d0/0x6d0 [ 889.493046] create_object.isra.0+0x3a/0xa30 [ 889.494009] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 889.495125] __kmalloc_track_caller+0x177/0x370 [ 889.496147] ? p9_client_create+0x41d/0x1230 [ 889.497113] kstrdup+0x36/0x70 [ 889.497821] p9_client_create+0x41d/0x1230 [ 889.498753] ? lock_downgrade+0x6d0/0x6d0 [ 889.499679] ? p9_client_flush+0x430/0x430 [ 889.500606] ? trace_hardirqs_on+0x5b/0x180 [ 889.501659] ? lockdep_init_map_type+0x2c7/0x780 [ 889.502098] loop2: detected capacity change from 0 to 41948160 [ 889.502769] ? __raw_spin_lock_init+0x36/0x110 [ 889.502797] v9fs_session_init+0x1dd/0x1680 [ 889.505526] ? lock_release+0x680/0x680 [ 889.506406] ? kmem_cache_alloc_trace+0x151/0x320 [ 889.507464] ? v9fs_show_options+0x690/0x690 [ 889.508463] ? trace_hardirqs_on+0x5b/0x180 [ 889.509650] ? kasan_unpoison_shadow+0x33/0x50 [ 889.510653] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 889.511785] v9fs_mount+0x79/0x8f0 [ 889.512596] ? v9fs_write_inode+0x60/0x60 [ 889.513502] legacy_get_tree+0x105/0x220 [ 889.514390] vfs_get_tree+0x8e/0x300 [ 889.515214] path_mount+0x1490/0x21e0 [ 889.516067] ? strncpy_from_user+0x9e/0x470 [ 889.517016] ? finish_automount+0xa90/0xa90 [ 889.517965] ? getname_flags.part.0+0x1dd/0x4f0 [ 889.518997] ? _copy_from_user+0xfb/0x1b0 [ 889.520048] __x64_sys_mount+0x282/0x300 01:09:36 executing program 7: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) timer_delete(0x0) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000000)={0xc92bfb053a14a5a}, 0x0) r0 = gettid() capget(&(0x7f0000000080)={0x20071026, r0}, &(0x7f0000000100)) timer_create(0x3, &(0x7f00000003c0)={0x0, 0x1000002e, 0x2, @thr={&(0x7f0000000380)="046d91aabe8b59babf80879a918c2766328ef52030c386efa3c0656393ae2ee7a4b47e9bdde8e8b7c1a281b4dedccef9736d11a8c1303a6714e9969009d05b", &(0x7f00000004c0)="7ae662e921d48f4f924675059336348f18fd2b1bfb69dbe80402f0dd936eb90d84d6c60c1942ceb8a9813193e6941b55cfffa85565946e85b2904d2f4b55bbfa173209483d68863c55ac8834944119f1c1fe23b58d6dae0562abdf5b482d3f97a3c6ed0825b36a39424721099792a397536b185819b1d66895469d69bef92d75d35087540aea5bfa5b6688b47aa974ecc3922ab460f3de490000000000"}}, &(0x7f0000000340)=0x0) capset(&(0x7f0000000180)={0x19980330, 0xffffffffffffffff}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) timer_settime(r1, 0x1, &(0x7f0000000040)={{r3, r4+60000000}, {r5, r6+10000000}}, &(0x7f0000000300)) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="140000001600010d0000000000000000000479ab0112e771690c2d4170de34389fdbd32aeb4714c1fc51288770d4d9edc67bc0cb27f8850900000099794b77f35767d8b56772508252927d186e0e290ebdba5ac2d3adaa4a30505d1ab49f33277a377a311d5e076013a3e0dd01f7307960956b7f2c960c3f20a007d7ac7376ca6ccca0d89ac3964fb07d68cd0d6ac799cf15ebcd835d85d11aec110276758cf4014436e6640cf05b24d12b2ac6307cd016a92cc48a"], 0x14}}, 0x0) lseek(r2, 0xffffffff, 0x902f90f22c7c3cf) read(r2, &(0x7f0000000080)=""/65, 0x41) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 889.520946] ? copy_mnt_ns+0xa00/0xa00 [ 889.521975] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 889.523101] ? syscall_enter_from_user_mode+0x1d/0x50 [ 889.524276] do_syscall_64+0x33/0x40 [ 889.525075] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 889.526176] RIP: 0033:0x7f42b2db2b19 [ 889.526969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 889.530890] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 889.532532] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 889.534062] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 889.535597] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 889.537117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 889.538644] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 889.556515] FAULT_INJECTION: forcing a failure. [ 889.556515] name failslab, interval 1, probability 0, space 0, times 0 [ 889.559143] CPU: 1 PID: 7029 Comm: syz-executor.6 Not tainted 5.10.242 #1 [ 889.560625] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 889.562381] Call Trace: [ 889.562949] dump_stack+0x107/0x167 [ 889.563746] should_fail.cold+0x5/0xa [ 889.564560] ? create_object.isra.0+0x3a/0xa30 [ 889.565539] should_failslab+0x5/0x20 [ 889.566358] kmem_cache_alloc+0x5b/0x310 [ 889.567231] create_object.isra.0+0x3a/0xa30 [ 889.568176] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 889.569269] kmem_cache_alloc+0x159/0x310 [ 889.570147] ? __d_lookup+0x3bf/0x760 [ 889.571006] __d_alloc+0x2a/0x990 [ 889.571788] d_alloc+0x46/0x1c0 [ 889.572544] __lookup_hash+0xcc/0x190 [ 889.573370] do_renameat2+0x51f/0xbf0 [ 889.574252] ? __ia32_sys_link+0x80/0x80 [ 889.575145] ? __virt_addr_valid+0x170/0x5d0 [ 889.576199] ? __check_object_size+0x319/0x440 [ 889.577195] ? getname_flags.part.0+0x1dd/0x4f0 [ 889.578203] __x64_sys_rename+0x7d/0xa0 [ 889.579063] do_syscall_64+0x33/0x40 [ 889.579887] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 889.580979] RIP: 0033:0x7fae24b00b19 [ 889.581782] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 889.585706] RSP: 002b:00007fae22076188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 889.587501] RAX: ffffffffffffffda RBX: 00007fae24c13f60 RCX: 00007fae24b00b19 [ 889.589425] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 889.591151] RBP: 00007fae220761d0 R08: 0000000000000000 R09: 0000000000000000 [ 889.592683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 889.594228] R13: 00007ffca61ab64f R14: 00007fae22076300 R15: 0000000000022000 [ 889.611562] capability: warning: `syz-executor.7' uses deprecated v2 capabilities in a way that may be insecure [ 889.615411] FAULT_INJECTION: forcing a failure. [ 889.615411] name failslab, interval 1, probability 0, space 0, times 0 [ 889.617064] CPU: 0 PID: 7019 Comm: syz-executor.5 Not tainted 5.10.242 #1 [ 889.618008] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 889.619146] Call Trace: [ 889.619525] dump_stack+0x107/0x167 [ 889.620003] should_fail.cold+0x5/0xa [ 889.620503] ? getname_flags.part.0+0x50/0x4f0 [ 889.621103] should_failslab+0x5/0x20 [ 889.621607] kmem_cache_alloc+0x5b/0x310 [ 889.622156] ? strncpy_from_user+0x9e/0x470 [ 889.622286] capability: warning: `syz-executor.7' uses 32-bit capabilities (legacy support in use) [ 889.622739] getname_flags.part.0+0x50/0x4f0 [ 889.625257] getname_flags+0x9a/0xe0 [ 889.625777] __x64_sys_rename+0x65/0xa0 [ 889.626332] do_syscall_64+0x33/0x40 [ 889.626855] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 889.627631] RIP: 0033:0x7fa96fa17b19 [ 889.628129] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 889.630643] RSP: 002b:00007fa96cf8d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 889.631624] FAULT_INJECTION: forcing a failure. [ 889.631624] name failslab, interval 1, probability 0, space 0, times 0 [ 889.631684] RAX: ffffffffffffffda RBX: 00007fa96fb2af60 RCX: 00007fa96fa17b19 [ 889.631709] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 889.636171] RBP: 00007fa96cf8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 889.637128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 889.638061] R13: 00007fffc4cfcc4f R14: 00007fa96cf8d300 R15: 0000000000022000 [ 889.639019] CPU: 1 PID: 7027 Comm: syz-executor.4 Not tainted 5.10.242 #1 [ 889.640515] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 889.642278] Call Trace: [ 889.642846] dump_stack+0x107/0x167 [ 889.643655] should_fail.cold+0x5/0xa [ 889.644245] FAULT_INJECTION: forcing a failure. [ 889.644245] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 889.644475] ? getname_flags.part.0+0x50/0x4f0 [ 889.646922] should_failslab+0x5/0x20 [ 889.647748] kmem_cache_alloc+0x5b/0x310 [ 889.648622] ? strncpy_from_user+0x9e/0x470 [ 889.649549] getname_flags.part.0+0x50/0x4f0 [ 889.650493] getname_flags+0x9a/0xe0 [ 889.651284] __x64_sys_rename+0x65/0xa0 [ 889.652152] do_syscall_64+0x33/0x40 [ 889.652949] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 889.654047] RIP: 0033:0x7f17f2c8cb19 [ 889.654836] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 889.658773] RSP: 002b:00007f17f0202188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 889.660405] RAX: ffffffffffffffda RBX: 00007f17f2d9ff60 RCX: 00007f17f2c8cb19 [ 889.661948] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 889.663479] RBP: 00007f17f02021d0 R08: 0000000000000000 R09: 0000000000000000 [ 889.664985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 889.666498] R13: 00007ffcb391048f R14: 00007f17f0202300 R15: 0000000000022000 [ 889.668049] CPU: 0 PID: 7016 Comm: syz-executor.3 Not tainted 5.10.242 #1 [ 889.668939] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 889.670030] Call Trace: [ 889.670367] dump_stack+0x107/0x167 [ 889.670834] should_fail.cold+0x5/0xa [ 889.671337] strncpy_from_user+0x34/0x470 [ 889.671862] getname_flags.part.0+0x95/0x4f0 [ 889.672425] getname_flags+0x9a/0xe0 [ 889.672940] __x64_sys_rename+0x65/0xa0 [ 889.673449] do_syscall_64+0x33/0x40 [ 889.673920] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 889.674562] RIP: 0033:0x7f55a12d3b19 [ 889.675033] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 889.677483] RSP: 002b:00007f559e849188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 889.678445] RAX: ffffffffffffffda RBX: 00007f55a13e6f60 RCX: 00007f55a12d3b19 [ 889.679359] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 889.680271] RBP: 00007f559e8491d0 R08: 0000000000000000 R09: 0000000000000000 [ 889.681185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 889.682093] R13: 00007ffde9396a2f R14: 00007f559e849300 R15: 0000000000022000 01:09:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 7) 01:09:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 01:09:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 5) 01:09:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 889.784044] FAULT_INJECTION: forcing a failure. [ 889.784044] name failslab, interval 1, probability 0, space 0, times 0 [ 889.785466] CPU: 0 PID: 7054 Comm: syz-executor.3 Not tainted 5.10.242 #1 [ 889.786318] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 889.787322] Call Trace: [ 889.787646] dump_stack+0x107/0x167 [ 889.788087] should_fail.cold+0x5/0xa [ 889.788548] ? jbd2__journal_start+0x190/0x7e0 [ 889.789101] should_failslab+0x5/0x20 [ 889.789559] kmem_cache_alloc+0x5b/0x310 [ 889.790055] ? ext4_dx_find_entry+0x600/0x600 [ 889.790593] jbd2__journal_start+0x190/0x7e0 [ 889.791131] __ext4_journal_start_sb+0x214/0x390 [ 889.791721] ext4_rename+0x96d/0x2bc0 [ 889.792188] ? ext4_tmpfile+0x440/0x440 [ 889.792675] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 889.793319] ? lock_acquire+0x197/0x470 [ 889.793802] ? vfs_rename+0xcb5/0x1510 [ 889.794289] ? lockref_get+0x11/0x50 [ 889.794738] ? find_held_lock+0x2c/0x110 [ 889.795240] ? down_write_nested+0xe4/0x160 [ 889.795784] ext4_rename2+0x1af/0x240 [ 889.796247] vfs_rename+0xd6c/0x1510 [ 889.796704] ? vfs_unlink+0x8b0/0x8b0 [ 889.797169] ? lookup_dcache+0x65/0x130 [ 889.797659] do_renameat2+0xae1/0xbf0 [ 889.798125] ? __ia32_sys_link+0x80/0x80 [ 889.798627] ? __virt_addr_valid+0x170/0x5d0 [ 889.799161] ? __check_object_size+0x319/0x440 [ 889.799827] __x64_sys_rename+0x7d/0xa0 [ 889.800308] do_syscall_64+0x33/0x40 [ 889.800764] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 889.801383] RIP: 0033:0x7f55a12d3b19 [ 889.801835] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 889.804054] RSP: 002b:00007f559e849188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 889.804974] RAX: ffffffffffffffda RBX: 00007f55a13e6f60 RCX: 00007f55a12d3b19 [ 889.805827] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 889.806684] RBP: 00007f559e8491d0 R08: 0000000000000000 R09: 0000000000000000 [ 889.807563] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 889.808423] R13: 00007ffde9396a2f R14: 00007f559e849300 R15: 0000000000022000 01:09:36 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 24) [ 889.858061] loop1: detected capacity change from 0 to 41948160 [ 889.863504] FAULT_INJECTION: forcing a failure. [ 889.863504] name failslab, interval 1, probability 0, space 0, times 0 [ 889.864934] CPU: 0 PID: 7059 Comm: syz-executor.5 Not tainted 5.10.242 #1 [ 889.865752] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 889.866749] Call Trace: [ 889.867097] dump_stack+0x107/0x167 [ 889.867572] should_fail.cold+0x5/0xa [ 889.868040] ? create_object.isra.0+0x3a/0xa30 [ 889.868622] should_failslab+0x5/0x20 [ 889.869083] kmem_cache_alloc+0x5b/0x310 [ 889.869569] create_object.isra.0+0x3a/0xa30 [ 889.870095] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 889.870713] kmem_cache_alloc+0x159/0x310 [ 889.871246] ? strncpy_from_user+0x9e/0x470 [ 889.871812] getname_flags.part.0+0x50/0x4f0 [ 889.872352] getname_flags+0x9a/0xe0 [ 889.872809] __x64_sys_rename+0x65/0xa0 [ 889.873298] do_syscall_64+0x33/0x40 [ 889.873758] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 889.874382] RIP: 0033:0x7fa96fa17b19 [ 889.874831] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 889.877071] RSP: 002b:00007fa96cf8d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 889.878001] RAX: ffffffffffffffda RBX: 00007fa96fb2af60 RCX: 00007fa96fa17b19 [ 889.878868] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 889.879739] RBP: 00007fa96cf8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 889.880600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 889.881478] R13: 00007fffc4cfcc4f R14: 00007fa96cf8d300 R15: 0000000000022000 01:09:36 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 9) [ 889.897433] FAULT_INJECTION: forcing a failure. [ 889.897433] name failslab, interval 1, probability 0, space 0, times 0 [ 889.898875] CPU: 0 PID: 7062 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 889.899711] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 889.900716] Call Trace: [ 889.901037] dump_stack+0x107/0x167 [ 889.901473] should_fail.cold+0x5/0xa [ 889.901936] should_failslab+0x5/0x20 [ 889.902403] __kmalloc_track_caller+0x79/0x370 [ 889.902962] ? p9_client_create+0x51e/0x1230 [ 889.903505] kmemdup_nul+0x2d/0xa0 [ 889.903935] p9_client_create+0x51e/0x1230 [ 889.904448] ? p9_client_flush+0x430/0x430 [ 889.904963] ? trace_hardirqs_on+0x5b/0x180 [ 889.905486] ? lockdep_init_map_type+0x2c7/0x780 [ 889.906059] ? __raw_spin_lock_init+0x36/0x110 [ 889.906615] v9fs_session_init+0x1dd/0x1680 [ 889.907141] ? lock_release+0x680/0x680 [ 889.907645] ? kmem_cache_alloc_trace+0x151/0x320 [ 889.908235] ? v9fs_show_options+0x690/0x690 [ 889.908777] ? trace_hardirqs_on+0x5b/0x180 [ 889.909299] ? kasan_unpoison_shadow+0x33/0x50 [ 889.909850] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 889.910461] v9fs_mount+0x79/0x8f0 [ 889.910890] ? v9fs_write_inode+0x60/0x60 [ 889.911401] legacy_get_tree+0x105/0x220 [ 889.911903] vfs_get_tree+0x8e/0x300 [ 889.912355] path_mount+0x1490/0x21e0 [ 889.912824] ? strncpy_from_user+0x9e/0x470 [ 889.913343] ? finish_automount+0xa90/0xa90 [ 889.913865] ? getname_flags.part.0+0x1dd/0x4f0 [ 889.914428] ? _copy_from_user+0xfb/0x1b0 [ 889.914933] __x64_sys_mount+0x282/0x300 [ 889.915436] ? copy_mnt_ns+0xa00/0xa00 [ 889.915906] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 889.916535] ? syscall_enter_from_user_mode+0x1d/0x50 [ 889.917159] do_syscall_64+0x33/0x40 [ 889.917607] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 889.918246] RIP: 0033:0x7f42b2db2b19 [ 889.918694] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 889.919381] loop2: detected capacity change from 0 to 41948160 [ 889.920919] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 889.920932] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 889.920938] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 889.920944] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 889.920950] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 889.920956] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 01:09:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 890.036010] loop1: detected capacity change from 0 to 41948160 [ 890.046004] loop6: detected capacity change from 0 to 41948160 [ 890.078494] FAULT_INJECTION: forcing a failure. [ 890.078494] name failslab, interval 1, probability 0, space 0, times 0 [ 890.079998] CPU: 0 PID: 7072 Comm: syz-executor.6 Not tainted 5.10.242 #1 [ 890.080824] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 890.081817] Call Trace: [ 890.082138] dump_stack+0x107/0x167 [ 890.082585] should_fail.cold+0x5/0xa [ 890.083052] ? create_object.isra.0+0x3a/0xa30 [ 890.083609] should_failslab+0x5/0x20 [ 890.084068] kmem_cache_alloc+0x5b/0x310 [ 890.084563] create_object.isra.0+0x3a/0xa30 [ 890.085090] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 890.085698] kmem_cache_alloc+0x159/0x310 [ 890.086195] ? __d_lookup+0x3bf/0x760 [ 890.086656] __d_alloc+0x2a/0x990 [ 890.087081] d_alloc+0x46/0x1c0 [ 890.087489] __lookup_hash+0xcc/0x190 [ 890.087951] do_renameat2+0x51f/0xbf0 [ 890.088417] ? __ia32_sys_link+0x80/0x80 [ 890.088915] ? __virt_addr_valid+0x170/0x5d0 [ 890.089446] ? __check_object_size+0x319/0x440 [ 890.090010] ? getname_flags.part.0+0x1dd/0x4f0 [ 890.090576] __x64_sys_rename+0x7d/0xa0 [ 890.091060] do_syscall_64+0x33/0x40 [ 890.091521] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 890.092140] RIP: 0033:0x7fae24b00b19 [ 890.092589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 890.094881] RSP: 002b:00007fae22076188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 890.095811] RAX: ffffffffffffffda RBX: 00007fae24c13f60 RCX: 00007fae24b00b19 [ 890.096678] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 890.097539] RBP: 00007fae220761d0 R08: 0000000000000000 R09: 0000000000000000 [ 890.098402] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 890.099264] R13: 00007ffca61ab64f R14: 00007fae22076300 R15: 0000000000022000 01:09:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 5) 01:09:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 8) 01:09:50 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 01:09:50 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 25) 01:09:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 6) 01:09:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 01:09:50 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 10) 01:09:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 903.367204] loop4: detected capacity change from 0 to 41948160 [ 903.387324] FAULT_INJECTION: forcing a failure. [ 903.387324] name failslab, interval 1, probability 0, space 0, times 0 [ 903.389937] CPU: 0 PID: 7093 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 903.391500] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 903.391818] loop1: detected capacity change from 0 to 41948160 [ 903.393370] Call Trace: [ 903.393396] dump_stack+0x107/0x167 [ 903.393417] should_fail.cold+0x5/0xa [ 903.393444] ? create_object.isra.0+0x3a/0xa30 [ 903.398003] should_failslab+0x5/0x20 [ 903.398863] kmem_cache_alloc+0x5b/0x310 [ 903.399804] create_object.isra.0+0x3a/0xa30 [ 903.400780] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 903.401929] __kmalloc_track_caller+0x177/0x370 [ 903.402982] ? p9_client_create+0x51e/0x1230 [ 903.403986] kmemdup_nul+0x2d/0xa0 [ 903.404800] p9_client_create+0x51e/0x1230 [ 903.405763] ? p9_client_flush+0x430/0x430 [ 903.406708] ? trace_hardirqs_on+0x5b/0x180 [ 903.407688] ? lockdep_init_map_type+0x2c7/0x780 [ 903.408758] ? __raw_spin_lock_init+0x36/0x110 [ 903.409795] v9fs_session_init+0x1dd/0x1680 [ 903.410779] ? lock_release+0x680/0x680 [ 903.411691] ? kmem_cache_alloc_trace+0x151/0x320 [ 903.412779] ? v9fs_show_options+0x690/0x690 [ 903.413772] ? trace_hardirqs_on+0x5b/0x180 [ 903.414756] ? kasan_unpoison_shadow+0x33/0x50 [ 903.415795] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 903.416942] v9fs_mount+0x79/0x8f0 [ 903.417747] ? v9fs_write_inode+0x60/0x60 [ 903.418673] legacy_get_tree+0x105/0x220 [ 903.419599] vfs_get_tree+0x8e/0x300 [ 903.420442] path_mount+0x1490/0x21e0 [ 903.421311] ? strncpy_from_user+0x9e/0x470 [ 903.422282] ? finish_automount+0xa90/0xa90 [ 903.423254] ? getname_flags.part.0+0x1dd/0x4f0 [ 903.424310] ? _copy_from_user+0xfb/0x1b0 [ 903.425260] __x64_sys_mount+0x282/0x300 [ 903.426179] ? copy_mnt_ns+0xa00/0xa00 [ 903.427063] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 903.428251] ? syscall_enter_from_user_mode+0x1d/0x50 [ 903.429415] do_syscall_64+0x33/0x40 [ 903.430261] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 903.431426] RIP: 0033:0x7f42b2db2b19 [ 903.432281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 903.436465] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 903.438189] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 903.439822] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 903.441467] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 903.443242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 903.444871] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 903.455202] FAULT_INJECTION: forcing a failure. 01:09:50 executing program 7: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) timer_delete(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x80000, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x21}, 0x0, 0xffffffff7fffffff, 0xffffffffffffffff, 0x9) capset(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$DVD_READ_STRUCT(r0, 0x5327, 0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x0, 0x1}, &(0x7f0000000340)) timer_create(0x3, &(0x7f0000000000)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) timer_gettime(r1, &(0x7f0000000080)) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x4) clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 903.455202] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 903.458484] CPU: 0 PID: 7101 Comm: syz-executor.6 Not tainted 5.10.242 #1 [ 903.460080] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 903.461943] Call Trace: [ 903.462532] dump_stack+0x107/0x167 [ 903.463352] should_fail.cold+0x5/0xa [ 903.464230] _copy_from_user+0x2e/0x1b0 [ 903.465144] kstrtouint_from_user+0xbd/0x220 [ 903.466141] ? kstrtou8_from_user+0x210/0x210 [ 903.467172] ? lock_acquire+0x197/0x470 [ 903.468081] ? ksys_write+0x12d/0x260 [ 903.468959] proc_fail_nth_write+0x78/0x220 [ 903.469925] ? proc_task_getattr+0x1f0/0x1f0 [ 903.470941] ? proc_task_getattr+0x1f0/0x1f0 [ 903.471947] vfs_write+0x29a/0xb10 [ 903.472757] ksys_write+0x12d/0x260 [ 903.473584] ? __ia32_sys_read+0xb0/0xb0 [ 903.474505] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 903.475708] ? syscall_enter_from_user_mode+0x1d/0x50 [ 903.476876] do_syscall_64+0x33/0x40 [ 903.477716] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 903.478868] RIP: 0033:0x7fae24ab35ff [ 903.479715] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 903.483911] RSP: 002b:00007fae22055170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 903.485638] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fae24ab35ff [ 903.487265] RDX: 0000000000000001 RSI: 00007fae220551e0 RDI: 0000000000000005 [ 903.489053] RBP: 00007fae220551d0 R08: 0000000000000000 R09: 0000000000000000 [ 903.490681] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 903.492316] R13: 00007ffca61ab64f R14: 00007fae22055300 R15: 0000000000022000 [ 903.500498] FAULT_INJECTION: forcing a failure. [ 903.500498] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 903.503188] CPU: 0 PID: 7103 Comm: syz-executor.5 Not tainted 5.10.242 #1 [ 903.504821] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 903.506840] Call Trace: [ 903.507491] dump_stack+0x107/0x167 [ 903.508366] should_fail.cold+0x5/0xa [ 903.509279] strncpy_from_user+0x34/0x470 [ 903.510258] getname_flags.part.0+0x95/0x4f0 [ 903.511291] getname_flags+0x9a/0xe0 [ 903.512229] __x64_sys_rename+0x65/0xa0 [ 903.513157] do_syscall_64+0x33/0x40 [ 903.514026] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 903.515215] RIP: 0033:0x7fa96fa17b19 [ 903.516095] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 903.520407] RSP: 002b:00007fa96cf6c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 903.522186] RAX: ffffffffffffffda RBX: 00007fa96fb2b020 RCX: 00007fa96fa17b19 [ 903.523917] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 903.525568] RBP: 00007fa96cf6c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 903.527296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 903.529035] R13: 00007fffc4cfcc4f R14: 00007fa96cf6c300 R15: 0000000000022000 [ 903.544521] FAULT_INJECTION: forcing a failure. [ 903.544521] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 903.547372] CPU: 1 PID: 7100 Comm: syz-executor.4 Not tainted 5.10.242 #1 [ 903.548927] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 903.550743] Call Trace: [ 903.551325] dump_stack+0x107/0x167 [ 903.552121] should_fail.cold+0x5/0xa [ 903.552957] __alloc_pages_nodemask+0x182/0x600 [ 903.553948] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 903.555218] ? kmem_cache_alloc+0x301/0x310 [ 903.556190] alloc_pages_current+0x187/0x280 [ 903.557150] allocate_slab+0x26f/0x380 [ 903.558003] ___slab_alloc+0x470/0x700 [ 903.558858] ? getname_flags.part.0+0x50/0x4f0 [ 903.559875] ? __virt_addr_valid+0x170/0x5d0 [ 903.560827] ? getname_flags.part.0+0x50/0x4f0 [ 903.561817] ? kmem_cache_alloc+0x301/0x310 [ 903.562745] ? getname_flags.part.0+0x50/0x4f0 [ 903.563734] kmem_cache_alloc+0x301/0x310 [ 903.564625] getname_flags.part.0+0x50/0x4f0 [ 903.564823] FAULT_INJECTION: forcing a failure. [ 903.564823] name failslab, interval 1, probability 0, space 0, times 0 [ 903.565567] getname_flags+0x9a/0xe0 [ 903.565590] __x64_sys_rename+0x65/0xa0 [ 903.565615] do_syscall_64+0x33/0x40 [ 903.570578] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 903.571693] RIP: 0033:0x7f17f2c8cb19 [ 903.572491] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 903.576492] RSP: 002b:00007f17f01e1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 903.578128] RAX: ffffffffffffffda RBX: 00007f17f2da0020 RCX: 00007f17f2c8cb19 [ 903.579706] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 903.581252] RBP: 00007f17f01e11d0 R08: 0000000000000000 R09: 0000000000000000 [ 903.582844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 903.584434] R13: 00007ffcb391048f R14: 00007f17f01e1300 R15: 0000000000022000 [ 903.586008] CPU: 0 PID: 7104 Comm: syz-executor.3 Not tainted 5.10.242 #1 [ 903.587684] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 903.589705] Call Trace: [ 903.590324] dump_stack+0x107/0x167 [ 903.591167] should_fail.cold+0x5/0xa [ 903.592077] ? create_object.isra.0+0x3a/0xa30 [ 903.593140] should_failslab+0x5/0x20 [ 903.594018] kmem_cache_alloc+0x5b/0x310 [ 903.594954] ? __ext4_find_entry+0x9f1/0xfc0 [ 903.595992] create_object.isra.0+0x3a/0xa30 [ 903.596986] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 903.598164] kmem_cache_alloc+0x159/0x310 [ 903.599116] ? ext4_dx_find_entry+0x600/0x600 [ 903.600247] jbd2__journal_start+0x190/0x7e0 [ 903.601287] __ext4_journal_start_sb+0x214/0x390 [ 903.602414] ext4_rename+0x96d/0x2bc0 [ 903.603370] ? ext4_tmpfile+0x440/0x440 [ 903.604452] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 903.605674] ? lock_acquire+0x197/0x470 [ 903.606590] ? vfs_rename+0xcb5/0x1510 [ 903.607608] ? lockref_get+0x11/0x50 [ 903.608488] ? find_held_lock+0x2c/0x110 [ 903.609458] ? down_write_nested+0xe4/0x160 [ 903.610598] ext4_rename2+0x1af/0x240 [ 903.611656] vfs_rename+0xd6c/0x1510 [ 903.612564] ? vfs_unlink+0x8b0/0x8b0 [ 903.613573] ? lookup_dcache+0x65/0x130 [ 903.614509] do_renameat2+0xae1/0xbf0 [ 903.615402] ? __ia32_sys_link+0x80/0x80 [ 903.616385] ? __virt_addr_valid+0x170/0x5d0 [ 903.617404] ? __check_object_size+0x319/0x440 [ 903.618667] __x64_sys_rename+0x7d/0xa0 [ 903.619898] do_syscall_64+0x33/0x40 [ 903.621051] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 903.622635] RIP: 0033:0x7f55a12d3b19 [ 903.623771] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 903.629025] RSP: 002b:00007f559e828188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 903.630856] RAX: ffffffffffffffda RBX: 00007f55a13e7020 RCX: 00007f55a12d3b19 [ 903.632524] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 903.634168] RBP: 00007f559e8281d0 R08: 0000000000000000 R09: 0000000000000000 [ 903.635838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 903.637522] R13: 00007ffde9396a2f R14: 00007f559e828300 R15: 0000000000022000 [ 903.661596] loop3: detected capacity change from 0 to 41948160 [ 903.665623] loop5: detected capacity change from 0 to 41948160 [ 903.682881] loop2: detected capacity change from 0 to 41948160 01:10:06 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:10:06 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 26) 01:10:06 executing program 7: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="6bda0578880a78a3b41460298855321b4698bfe0e53c33e930a2f777de0bcd123309566e58da2fa338f7eae9ca5b6681388a3cd8c1f822f6d5c8cf0c3946b9b4edca4913ce435b91cf660a8bc327331778719e979baeb1fb881cb5916285a83409d0962fa8f92a219464bc542a860d1d11e241", 0x73}, {&(0x7f00000000c0)="0b7f083968442140b6d307d0ae442f8f3ef3a2f6d8d479ba9e89e78fd2aaf033d2d07aa864e5f550ba7bde11aecc0ffcaf86bb0227b27592e95452d81faa8da5d0b514c1c126ccfb902251f8d1149cd2a72911e3acf7e769af796cb5f24804feef98bf2cc1cacd0e7c15f99e6fcdd86df682369f8c0f649fa94eb906301e17a9d049326287a79784948924b13225676987eddcebff0b6f416497115be4482e1203e15c767a2c690c94a81d5cf3784d0d290e", 0xb2}, {&(0x7f0000000180)="75b9815594bfc476eecb4fd07d2593db13fe215092b95f022bbca22e98afe0112ee92d51ebbd5dad942d51d5eac1825461f35d171133db6c8b548f071d207cdf30103917d2538edf47217b24fc733904be29999b0841253b8afbd1917a5e77efe92053787307274736137a15a9a247c7d296e932bf9df493c801c53f01c6dd29e999e51be043dbef0cbc5221fdc5", 0x8e}], 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x1a0}, 0x880) sendmmsg$inet6(r0, &(0x7f0000008540)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000400)="0a753fea", 0x4}], 0x1}}, {{0x0, 0x0, 0x0, 0x2d, &(0x7f0000000040), 0x70}}], 0x2, 0x0) 01:10:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 9) 01:10:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 01:10:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 7) 01:10:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 6) 01:10:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 919.764824] loop1: detected capacity change from 0 to 41948160 [ 919.796109] loop4: detected capacity change from 0 to 41948160 01:10:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 1) [ 919.815710] loop6: detected capacity change from 0 to 41948160 [ 919.844958] loop3: detected capacity change from 0 to 41948160 [ 919.852018] FAULT_INJECTION: forcing a failure. [ 919.852018] name failslab, interval 1, probability 0, space 0, times 0 [ 919.854695] CPU: 0 PID: 7139 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 919.856282] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 919.858202] Call Trace: [ 919.858842] dump_stack+0x107/0x167 [ 919.859696] should_fail.cold+0x5/0xa [ 919.860582] should_failslab+0x5/0x20 [ 919.861459] __kmalloc_track_caller+0x79/0x370 [ 919.862513] ? parse_opts.part.0+0x8e/0x340 [ 919.863514] kstrdup+0x36/0x70 [ 919.864270] parse_opts.part.0+0x8e/0x340 [ 919.865221] ? p9_fd_show_options+0x1c0/0x1c0 [ 919.866260] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 919.867452] ? quarantine_put+0x8b/0x1a0 [ 919.868394] ? trace_hardirqs_on+0x5b/0x180 [ 919.869385] ? kfree+0xd7/0x340 [ 919.870153] p9_fd_create+0x98/0x4a0 [ 919.871005] ? p9_conn_create+0x510/0x510 [ 919.871968] ? p9_client_create+0x798/0x1230 [ 919.872985] ? kfree+0xd7/0x340 01:10:06 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x8a2c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x2) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f00000002c0)={{0x0, 0x6, 0xfd, 0x7fffffff, 0x100000000, 0x8, 0x28a6, 0x7, 0xff, 0xee, 0x800, 0x1, 0x464, 0x5, 0x3}}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000080)={{r3, 0x80, 0x8, 0x4, 0x4, 0x80000000, 0x1, 0xf8c, 0x1, 0x1923, 0x80, 0x9, 0x9ddb, 0x20, 0x427}, 0x18, [0x0, 0x0, 0x0]}) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000240)={0x48100300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 919.873745] ? do_raw_spin_unlock+0x4f/0x220 [ 919.874897] p9_client_create+0x7ff/0x1230 [ 919.875898] ? p9_client_flush+0x430/0x430 [ 919.876876] ? trace_hardirqs_on+0x5b/0x180 [ 919.877879] ? lockdep_init_map_type+0x2c7/0x780 [ 919.878984] ? __raw_spin_lock_init+0x36/0x110 [ 919.880054] v9fs_session_init+0x1dd/0x1680 [ 919.881057] ? lock_release+0x680/0x680 [ 919.881983] ? kmem_cache_alloc_trace+0x151/0x320 [ 919.883098] ? v9fs_show_options+0x690/0x690 [ 919.884144] ? trace_hardirqs_on+0x5b/0x180 [ 919.885135] ? kasan_unpoison_shadow+0x33/0x50 [ 919.886183] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 919.887348] v9fs_mount+0x79/0x8f0 [ 919.888181] ? v9fs_write_inode+0x60/0x60 [ 919.889132] legacy_get_tree+0x105/0x220 [ 919.890073] vfs_get_tree+0x8e/0x300 [ 919.890924] path_mount+0x1490/0x21e0 [ 919.891818] ? strncpy_from_user+0x9e/0x470 [ 919.892803] ? finish_automount+0xa90/0xa90 [ 919.893798] ? getname_flags.part.0+0x1dd/0x4f0 [ 919.894874] ? _copy_from_user+0xfb/0x1b0 [ 919.895841] __x64_sys_mount+0x282/0x300 [ 919.896773] ? copy_mnt_ns+0xa00/0xa00 [ 919.897676] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 919.898878] ? syscall_enter_from_user_mode+0x1d/0x50 [ 919.900075] do_syscall_64+0x33/0x40 [ 919.900915] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 919.902084] RIP: 0033:0x7f42b2db2b19 [ 919.902930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 919.907133] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 919.908863] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 919.910479] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 919.912111] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 919.913738] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 919.915368] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 919.917172] 9pnet: Insufficient options for proto=fd [ 919.937475] FAULT_INJECTION: forcing a failure. [ 919.937475] name failslab, interval 1, probability 0, space 0, times 0 [ 919.938915] CPU: 1 PID: 7153 Comm: syz-executor.3 Not tainted 5.10.242 #1 [ 919.939731] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 919.940707] Call Trace: [ 919.941021] dump_stack+0x107/0x167 [ 919.941138] FAULT_INJECTION: forcing a failure. [ 919.941138] name failslab, interval 1, probability 0, space 0, times 0 [ 919.941459] should_fail.cold+0x5/0xa [ 919.944719] ? create_object.isra.0+0x3a/0xa30 [ 919.945262] should_failslab+0x5/0x20 [ 919.945717] kmem_cache_alloc+0x5b/0x310 [ 919.946205] create_object.isra.0+0x3a/0xa30 [ 919.946727] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 919.947333] kmem_cache_alloc+0x159/0x310 [ 919.947836] ? __d_lookup+0x3bf/0x760 [ 919.948295] __d_alloc+0x2a/0x990 [ 919.948712] d_alloc+0x46/0x1c0 [ 919.949106] __lookup_hash+0xcc/0x190 [ 919.949560] do_renameat2+0x51f/0xbf0 [ 919.950020] ? __ia32_sys_link+0x80/0x80 [ 919.950518] ? __virt_addr_valid+0x170/0x5d0 [ 919.951042] ? __check_object_size+0x319/0x440 [ 919.951593] ? getname_flags.part.0+0x1dd/0x4f0 [ 919.952166] __x64_sys_rename+0x7d/0xa0 [ 919.952639] do_syscall_64+0x33/0x40 [ 919.953083] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 919.953690] RIP: 0033:0x7f55a12d3b19 [ 919.954130] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 919.956302] RSP: 002b:00007f559e828188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 919.957202] RAX: ffffffffffffffda RBX: 00007f55a13e7020 RCX: 00007f55a12d3b19 [ 919.958048] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 919.958890] RBP: 00007f559e8281d0 R08: 0000000000000000 R09: 0000000000000000 [ 919.959741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 919.960582] R13: 00007ffde9396a2f R14: 00007f559e828300 R15: 0000000000022000 [ 919.961448] CPU: 0 PID: 7154 Comm: syz-executor.1 Not tainted 5.10.242 #1 [ 919.963207] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 919.965360] Call Trace: [ 919.966036] dump_stack+0x107/0x167 [ 919.966968] should_fail.cold+0x5/0xa [ 919.967956] ? getname_flags.part.0+0x50/0x4f0 [ 919.969128] should_failslab+0x5/0x20 [ 919.970094] kmem_cache_alloc+0x5b/0x310 [ 919.971136] getname_flags.part.0+0x50/0x4f0 [ 919.972258] getname_flags+0x9a/0xe0 [ 919.973207] __x64_sys_rename+0x56/0xa0 [ 919.974220] do_syscall_64+0x33/0x40 [ 919.975166] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 919.976472] RIP: 0033:0x7f0d8d27eb19 [ 919.977406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 919.982086] RSP: 002b:00007f0d8a7d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 919.984031] RAX: ffffffffffffffda RBX: 00007f0d8d392020 RCX: 00007f0d8d27eb19 [ 919.985838] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 919.987645] RBP: 00007f0d8a7d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 919.989445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 919.991231] R13: 00007fffd1f2f40f R14: 00007f0d8a7d3300 R15: 0000000000022000 [ 919.994281] FAULT_INJECTION: forcing a failure. [ 919.994281] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 919.997296] CPU: 0 PID: 7158 Comm: syz-executor.4 Not tainted 5.10.242 #1 [ 919.999011] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 920.001103] Call Trace: [ 920.001766] dump_stack+0x107/0x167 [ 920.002678] should_fail.cold+0x5/0xa [ 920.003646] strncpy_from_user+0x34/0x470 01:10:06 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 27) [ 920.004668] getname_flags.part.0+0x95/0x4f0 [ 920.005918] getname_flags+0x9a/0xe0 [ 920.006830] __x64_sys_rename+0x65/0xa0 [ 920.007819] do_syscall_64+0x33/0x40 [ 920.008735] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 920.010101] RIP: 0033:0x7f17f2c8cb19 [ 920.011020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 920.015589] RSP: 002b:00007f17f01c0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 920.017476] RAX: ffffffffffffffda RBX: 00007f17f2da00e0 RCX: 00007f17f2c8cb19 [ 920.019244] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 920.021007] RBP: 00007f17f01c01d0 R08: 0000000000000000 R09: 0000000000000000 [ 920.022761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 920.024531] R13: 00007ffcb391048f R14: 00007f17f01c0300 R15: 0000000000022000 01:10:06 executing program 7: pwrite64(0xffffffffffffffff, &(0x7f00000000c0)="04", 0x1, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000180)=@sco={0x1f, @none}}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x6}, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000007c0)=ANY=[], 0x68}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000001e00)={0x0, 0x0, "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", "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"}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x80, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000006c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000740)={0x5c, 0x1, 0x1, 0x301, 0x0, 0x0, {0xc, 0x0, 0x5}, [@CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x101}, @CTA_SEQ_ADJ_REPLY={0xc, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xfffffffe}]}, @CTA_SEQ_ADJ_REPLY={0x14, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x38}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x8000}]}, @CTA_SEQ_ADJ_ORIG={0x1c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x9}]}, @CTA_LABELS_MASK={0x4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40004}, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x34, 0x0, 0x200, 0x70bd25, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x6, 0x41}}}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TSID={0x5, 0xd2, 0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000040}, 0x8800) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = fcntl$dupfd(r5, 0x406, 0xffffffffffffffff) sendmsg$AUDIT_GET(r7, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x3e8, 0x2, 0x70bd25, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4040890}, 0x4) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) 01:10:06 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x202300, 0x28) [ 920.030215] FAULT_INJECTION: forcing a failure. [ 920.030215] name failslab, interval 1, probability 0, space 0, times 0 [ 920.033101] CPU: 0 PID: 7155 Comm: syz-executor.5 Not tainted 5.10.242 #1 [ 920.034770] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 920.036815] Call Trace: [ 920.037460] dump_stack+0x107/0x167 [ 920.038351] should_fail.cold+0x5/0xa [ 920.039279] ? jbd2__journal_start+0x190/0x7e0 [ 920.040412] should_failslab+0x5/0x20 [ 920.041340] kmem_cache_alloc+0x5b/0x310 [ 920.042327] ? ext4_dx_find_entry+0x600/0x600 [ 920.043431] jbd2__journal_start+0x190/0x7e0 [ 920.044535] __ext4_journal_start_sb+0x214/0x390 [ 920.045717] ext4_rename+0x96d/0x2bc0 [ 920.046652] ? ext4_tmpfile+0x440/0x440 [ 920.047633] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 920.048934] ? lock_acquire+0x197/0x470 [ 920.049900] ? vfs_rename+0xcb5/0x1510 [ 920.050876] ? lockref_get+0x11/0x50 [ 920.051792] ? find_held_lock+0x2c/0x110 [ 920.052799] ? down_write_nested+0xe4/0x160 [ 920.053867] ext4_rename2+0x1af/0x240 [ 920.054803] vfs_rename+0xd6c/0x1510 [ 920.055742] ? vfs_unlink+0x8b0/0x8b0 [ 920.056688] ? lookup_dcache+0x65/0x130 [ 920.057671] do_renameat2+0xae1/0xbf0 [ 920.058615] ? __ia32_sys_link+0x80/0x80 [ 920.059637] ? __virt_addr_valid+0x170/0x5d0 [ 920.060709] ? __check_object_size+0x319/0x440 [ 920.061855] __x64_sys_rename+0x7d/0xa0 [ 920.062829] do_syscall_64+0x33/0x40 [ 920.063749] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 920.064997] RIP: 0033:0x7fa96fa17b19 [ 920.065907] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 920.070417] RSP: 002b:00007fa96cf6c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 920.072284] RAX: ffffffffffffffda RBX: 00007fa96fb2b020 RCX: 00007fa96fa17b19 [ 920.074022] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 920.075791] RBP: 00007fa96cf6c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 920.077536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 920.079273] R13: 00007fffc4cfcc4f R14: 00007fa96cf6c300 R15: 0000000000022000 [ 920.081859] loop1: detected capacity change from 0 to 41948160 [ 920.089007] loop2: detected capacity change from 0 to 41948160 [ 920.107485] loop5: detected capacity change from 0 to 41948160 [ 920.142013] FAULT_INJECTION: forcing a failure. [ 920.142013] name failslab, interval 1, probability 0, space 0, times 0 [ 920.143369] CPU: 1 PID: 7167 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 920.144158] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 920.145111] Call Trace: [ 920.145417] dump_stack+0x107/0x167 [ 920.145838] should_fail.cold+0x5/0xa [ 920.146279] ? create_object.isra.0+0x3a/0xa30 [ 920.146800] should_failslab+0x5/0x20 [ 920.147237] kmem_cache_alloc+0x5b/0x310 [ 920.147707] ? legacy_get_tree+0x105/0x220 [ 920.148198] create_object.isra.0+0x3a/0xa30 [ 920.148703] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 920.149288] __kmalloc_track_caller+0x177/0x370 [ 920.149819] ? parse_opts.part.0+0x8e/0x340 [ 920.150316] kstrdup+0x36/0x70 [ 920.150684] parse_opts.part.0+0x8e/0x340 [ 920.151165] ? p9_fd_show_options+0x1c0/0x1c0 [ 920.151694] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 920.152293] ? quarantine_put+0x8b/0x1a0 [ 920.152758] ? trace_hardirqs_on+0x5b/0x180 [ 920.153249] ? kfree+0xd7/0x340 [ 920.153628] p9_fd_create+0x98/0x4a0 [ 920.154055] ? p9_conn_create+0x510/0x510 [ 920.154529] ? p9_client_create+0x798/0x1230 [ 920.155032] ? kfree+0xd7/0x340 [ 920.155409] ? do_raw_spin_unlock+0x4f/0x220 [ 920.155925] p9_client_create+0x7ff/0x1230 [ 920.156421] ? p9_client_flush+0x430/0x430 [ 920.156906] ? trace_hardirqs_on+0x5b/0x180 [ 920.157410] ? lockdep_init_map_type+0x2c7/0x780 [ 920.157953] ? __raw_spin_lock_init+0x36/0x110 [ 920.158482] v9fs_session_init+0x1dd/0x1680 [ 920.158979] ? lock_release+0x680/0x680 [ 920.159437] ? kmem_cache_alloc_trace+0x151/0x320 [ 920.159997] ? v9fs_show_options+0x690/0x690 [ 920.160507] ? trace_hardirqs_on+0x5b/0x180 [ 920.161001] ? kasan_unpoison_shadow+0x33/0x50 [ 920.161523] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 920.162103] v9fs_mount+0x79/0x8f0 [ 920.162511] ? v9fs_write_inode+0x60/0x60 [ 920.162981] legacy_get_tree+0x105/0x220 [ 920.163448] vfs_get_tree+0x8e/0x300 [ 920.163883] path_mount+0x1490/0x21e0 [ 920.164326] ? strncpy_from_user+0x9e/0x470 [ 920.164818] ? finish_automount+0xa90/0xa90 [ 920.165311] ? getname_flags.part.0+0x1dd/0x4f0 [ 920.165846] ? _copy_from_user+0xfb/0x1b0 [ 920.166324] __x64_sys_mount+0x282/0x300 [ 920.166788] ? copy_mnt_ns+0xa00/0xa00 [ 920.167234] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 920.167845] ? syscall_enter_from_user_mode+0x1d/0x50 [ 920.168437] do_syscall_64+0x33/0x40 [ 920.168867] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 920.169463] RIP: 0033:0x7f42b2db2b19 [ 920.169886] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 920.172008] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 920.172886] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 920.173703] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 920.174522] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 920.175338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 920.176170] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 01:10:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 7) 01:10:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 8) 01:10:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 2) [ 920.257974] FAULT_INJECTION: forcing a failure. [ 920.257974] name failslab, interval 1, probability 0, space 0, times 0 [ 920.259350] CPU: 1 PID: 7175 Comm: syz-executor.4 Not tainted 5.10.242 #1 [ 920.260136] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 920.261078] Call Trace: [ 920.261388] dump_stack+0x107/0x167 [ 920.261805] should_fail.cold+0x5/0xa [ 920.262252] ? jbd2__journal_start+0x190/0x7e0 [ 920.262775] should_failslab+0x5/0x20 [ 920.263214] kmem_cache_alloc+0x5b/0x310 [ 920.263685] ? ext4_dx_find_entry+0x600/0x600 [ 920.264200] jbd2__journal_start+0x190/0x7e0 [ 920.264703] __ext4_journal_start_sb+0x214/0x390 [ 920.265249] ext4_rename+0x96d/0x2bc0 [ 920.265691] ? ext4_tmpfile+0x440/0x440 [ 920.266152] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 920.266761] ? lock_acquire+0x197/0x470 [ 920.267217] ? vfs_rename+0xcb5/0x1510 [ 920.267680] ? lockref_get+0x11/0x50 [ 920.268106] ? find_held_lock+0x2c/0x110 [ 920.268586] ? down_write_nested+0xe4/0x160 [ 920.269086] ext4_rename2+0x1af/0x240 [ 920.269522] vfs_rename+0xd6c/0x1510 [ 920.269954] ? vfs_unlink+0x8b0/0x8b0 [ 920.270395] ? lookup_dcache+0x65/0x130 [ 920.270857] do_renameat2+0xae1/0xbf0 [ 920.271302] ? __ia32_sys_link+0x80/0x80 [ 920.271785] ? __virt_addr_valid+0x170/0x5d0 [ 920.272293] ? __check_object_size+0x319/0x440 [ 920.272837] __x64_sys_rename+0x7d/0xa0 [ 920.273300] do_syscall_64+0x33/0x40 [ 920.273734] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 920.274324] RIP: 0033:0x7f17f2c8cb19 [ 920.274749] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 920.276878] RSP: 002b:00007f17f0202188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 920.277756] RAX: ffffffffffffffda RBX: 00007f17f2d9ff60 RCX: 00007f17f2c8cb19 [ 920.278575] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 920.279394] RBP: 00007f17f02021d0 R08: 0000000000000000 R09: 0000000000000000 [ 920.280217] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 920.281034] R13: 00007ffcb391048f R14: 00007f17f0202300 R15: 0000000000022000 01:10:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 10) 01:10:07 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x3, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x114) creat(&(0x7f0000000200)='./mnt\x00', 0x30) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, @out_args}, 'mnt/encrypted_dir\x00'}) write$binfmt_elf64(r0, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x2, 0x20, 0x5, 0x4, 0x3, 0x3, 0x0, 0x3d2, 0x40, 0x196, 0x9, 0x3, 0x38, 0x1, 0x6, 0x473, 0x8}, [{0x4, 0x4, 0x401, 0x155, 0x81, 0x74c1, 0x2b, 0x3f0}, {0x7, 0x8, 0x1, 0x9, 0x80000000, 0x85c3, 0x101, 0x7}], "d242f67b9771b95f99b7b029f2d14f3a7fbcd52c435d0e34173d79e9cb37c9fc00b1783750a6f6e308023a2e74b40e7d7253b6c00b89da3979e9df6d6daf138ef06a6506fbd44a741319329c2431db0cc8e9c1d3288d88450a868c78954b523e65cf78d7d007f30081026d3b13c74fe4b6ce4786a742d8653be54d3e889722e27ff3e6c2c1332a63888a0f3de68c5444a090a7fcaf9daf163dcf542d40f03c1e6c6a4fa9c1ed35f129a9e37ace8edc1f70db0c1f5eec38ee0b3f85d4867195bfebf476de1aebdbef488a05215f1fdcb14b7de2b497f02c357699dd80564c15927ee5b7fdb905de348d2be5f783bc4f", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79f) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') open(&(0x7f0000000240)='./mnt\x00', 0x8100, 0x150) 01:10:07 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000002, 0x13, r0, 0x10000000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000001280)=ANY=[@ANYBLOB="21000e640100000018000000", @ANYRES32, @ANYBLOB="000000ffff0000002e2f66696c65d47e"]) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000012c0)={0x4, 0x40000000, 0x2, 0x6, 0x2}) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x13, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001180), 0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001240)={&(0x7f0000001140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001200)={&(0x7f00000011c0)={0x2c, r3, 0x804, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40c0}, 0x20000041) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000001100), 0x80000, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, 0x0, 0x0) write(r4, &(0x7f0000000100)="a44cd6eea2349dbffbedf6cb364110385e4d65bd1dd55a83b0b202eb287bad9d97b6eeee0e3068034036a43e5f9cbd6c42c768d554dd61cf0654cca455c9a793c8bb7d7ff0159d5d2b272333bd12f7fb04d56d553864b043377a4fdbe2c8729c5cbdb5f3e0aaadc1349e018d236fb7a10417b63701b371f68cb4da18c5fea4df0d37cfddfa53c154bfa15bbf4f5af757ce052cb647d13c8c68753bfe25c5877c9a33052f7b4ca99881944ffa6877dbb7932c20b69f13330ad4a1e72ba91388af059df922a06d17c576f9eadc55496f1801f68b0c9c1aefb21b550b15bf0db968701acde990873bfbe1c72e3ae009f59f4c8afa2c70634f4fbd05ef319154642f0a89aaed59aa6fa897cd92c7b31b482974eb45dd2567d62e5783e79c3be6452325c88aaee88343e4a7e86633f9134d1db5f75b9b5b485658a9b567e090cf23530425a85de93bbf7f72332fe9b45125b65cfa742869c8e0f4feec17fca73a93e464544325b4af7f0f9f140016e9b6d62a443b2e2889c941935cf210e342c1dee37baa367dcd33b9a5982b3f50696850addfe2bac70c1f18e634bb03d0f4297b4f48041d3cf9fd347a055be3e4145611481685d4bc174919cd37bf089435bc7b96d29c9939dc5de2138b42332ae5d0a38faad1f85d8482ec6c4cb6d5b32ef590c0070bb16d9dc4f1b877e3357c02b57c1b94a0b6321723dd16a2878a44621e7764700fb4f88ee4a339b106c1f7116ac62f08de2de29e219c4ba7b9204a8663003a5aaad3cb80d165b6782598dacdf285b0647048ebf0dfc8d44940fa4f1c1261776cf91cc18785bd891b616d1071a401d0dc9444c67bedd77252dacee8b5d246c90232e9165c0788dbe1f4b74e3eb773f231ca1160fa0e3230c2a200299297536de0332a3d59f1cd82ca0030707fff2d20aae4808a5b2e03c0f964d0951910fb18695d62aadda97d440d58eec1e3eb248024b65a56a0aa416bf45537c6ac87f36e06cb78b566c40a4e6b394c2c03ec5e7fad89d49bec4e546ec8655af92989b0b0c779aef2b045d7ac0ea776250e254d5fc633c2f93ed9515a2eb2e25a428931164e9acf317ec1bc5faaf181f3bc3dd60a9190c6530cc1ee77da98316b0a9a1acbcc0100ce4fb5e7134492967693f57c0131e5b670e57084810b833b57e7875af5cb3159d9732cdaa99c787ada5811b1ae0166268c24d6d47a8f0a92ff64d6d40c5987829e70eb956f40e5a28204fefbbbb447100f7d3336df5fc991f33584da98bbbc79fae33ef2da1829d5f93cdfb508653bce8685af4a763732e0c03fa2523146534269c51bae75f3294e84e73ec65713dd85cb73bd9d7b30255495fc77d089d467db0e0520b9e07ff56c207c83b137aa34f3017ea85766407c1c8eede2d0d92ae407a2cea5f3ec9a07b5c361793790938241ba12c82b0b6712786a4e89759563e36fbbf6725357b51297f7b054d2489b2356e77b988ef31eb386b6af37d4a9a72acaa2b1efd579ba0ec2163bad29c49dc55f85513b2233ca1a46c46b23b6830ce3525435d729fb6540003d0d64a2ef95816371fc51427c3026bddcf9cf7622bdb55fb471c70f85805101a4692b05dceb876920bf0d373d28602f28e504385566881290e0e3e9ae05f7a35fe6ba343f0803a76ad9ac133c1a1278f20b9d57210281fc550b423965d7a442526541722fc58b19bd569d8d0150c11204572e07c88afcf4e2d3fb997f70e773924d6f6a0154e6c8d61d38507c837f1fffb8cff1926ad5714df24b2a226771ec9c8e1a037abeaa6e62d0d166ed506b9dcfd45c91a0edf52d1e63900d396355d35c567309994cbe390f6538dd48adedd8437ea4c3d81314d8bdab86e6fa2c6bdf8aa30eb781327bc5b6f1055e9edf1407eba0eb5ef13e4bb810ca28e731db403f54eab8837cb6cfdc902e873157ae479b43c73e7af18a65b3e132b8b0ed6db11a791ad0da07b383096b765f3fea1eb2bc0b3e84f7d2deec56b9d6a6207ccfbfd6c31e61056a3b1df8f8016564f532404f8be641afff7062dc1b96b355afb495edd104bd4c5888280e212ce0bdc86f6aa3a629394dccb748298aa9ec0dcee7f244170252e9bc109a0c711509dbf94801dba816280825bdcde1ac140f1368a558795bde6dd756ce395cf7fd3dc2615448322c3fe04c4acd0014347d7f4759169ff0840d9ab4a57e73c1a0dc000b3d5eb8ebd0d326fdde0128cc3f2f1f185d3e1a0d55c72fdc6e0d0715576503ed267649f9cd6d73e8e265391d935ce4f1f8a595d86865d77bf1738005cbd9f6344f4354aa8ede5f4ee660268ad30381dee76a453e4b9799871614e04c2f79c0abcea0f468c9b1ee7981317d26ba5a4bd9f9f8e1c8f8b9684994983d71a7f5f9daea96158341e7d4e4124d8e712ed02a60ca36327d5cef88304581d4d4d86cd93086d67171e6a17adf090ee7dd7fe83b663e1a710f0dd22f1638532168e897e029362e161b291b3aa84f44232bec55feb7e0f0ec60c1624b6711286537ba58274c2e7a1e4a85f9358edad7ca8f673936a29a06969a976db21012d5e7be6ad20b81971b29a347b215633ea27255949c76807c25d14a393f3e2751c5c9fee977809b9cdd5d19c524b8c246437f5508a38f25549763e587e870eea68dd49cee65c2d142644264adc5f67869e6a09f695be63097a517b10002e8f99aa49936f00be0ca8bd44289bdf05a729a2aed9df8b55fbbd839807e0cd86970acfdf73417c0b8eab80e00cd69e4175a88df504d3bd0dd2ab62bd56a6dfa6a519be2291f9fb502820e11d175449b6a7abbab34b506911cc69d37f0eb8cb67b82938d185353de272584f0d67c4d92c901f425aada3f8fb85cf9f504da398b21a5e46c3d1c2d51baf4ea2140784703124ad8740480cd6eaed701c367ef4e42458e1702e6ecbb48f6ff1105aa3dc3d1bb7ec75afe716757dfd9688a5f40a5999bd173d9aee46a9d776fc97d007a61614863e51ea67613f98ae841f456b9f733fc0e90809f76524565f17a9cc98f246834bbbba6a1091a6eac1ce8e154c77147799cf7dca7417b6967238e4f90e78527ffc6fac271d96610243e09a5e29850edccc980a2404503fba3863221334deb7fc04bd6e51b8a90fcb2b18f4de76832406009cd08e51b2632042c6e0bd56448cd4851b1c16dfd222193eaec53501d0dde22808e9cf8642fc73deb6691a0ba9d7b30fdb410b4d3ae9fb8211e65b9cf36b6db5d99329651cf3869a2f20e7845c10e7034f272de6bec58b2842a1c9e9c67d03457ccac48ddeca69e34ae73344e90c9224f9dfedf65d4f7ae35198214b70ff2e7f4d2e9c3e708488015087fa5895be042eb1697059a396955575fb5dec2dcacc95a8b4b5660ce3b45b8635f3fdcb22dc1d6e65b0f07b088e700f7103761fdd6794790a2650cdb26ef443711859b7986abb83e6a313cddf1eae348609ac927c34f518bc4c15a50e6acc01b66bea8bc08af130c00f748e89221f71e9506bb355c6d67d8ab810af053cdf515d2b1942e29b9c9ef6ea74e770c629bd185bcd66630c6e3f54bf85e0903ec1fbe2fdd0e0d6851bdab7c39f0198f821625e610ad9206ecdcfbab44cc936789702f1e3222b34e10633dea80d222ac6320cec879e6402b5f0c161c917d21efdac096fb92e338d14aef0301624e6f096c3c6c9f5ec1050c4bb5ddb5523344fc1d3325f0ff6149d8f4dc197cc30276c1a4790a0c59df147d85265854b332ecf45d3f78a02d25c5eef7a1ce90cb24cf7c12467bcb4f8e1ef8bbd9d9cc47ca4fa788f905a14efb32b95541a18f14cc63bb0058ce97512a3514581f92ec4e9cda5461b36049dafc2b70263570313ad454dbceedb5721fb6dbb9163f93ac77498d4e839b94e7252b246a17290e79b49c799d6fb6d76a9a23dca8c5b0a597b023b8de30f1eb616d41fe66f7c1a667245e6e2d41f5c5a1c72dfbd931d260ebc13cecbd15b5375934fb2c5352c2c21736d5c8461919be168765631357dd6b2305a60426d9d12ba32dc1b3897c11ce8419b39fb4d9c714e618a0c25b52d98bfb659216acf4d3ce0c5afb3d350affc6918801d3fd1d3b98debf361725368e0eb0ce933be063978883521aed85b2779836c0a08a9e78875c173d95f5f946c34d176eb8cb6eb0c1b9b019e057414858d8b9321bc2fedca17c19595dee19ae282a65761d14e4d008d77320ad0b78006fb6978788062facc1683f0bb7a9f4cab280c692090f9994324df44ed2e39d90fc9aa2b427d2754e7aaccb4923029db1a7cc738690c269e1a7c75c0613aa8761031bd7d38d15a2c17851862b94044db8828568c275441aee5c5b84498435abed3ed25734aacf0db4344b3e1469589aba2a6d44222628963b2fec70aab58e1cdc464c13717cb367c2aa57e87a94f2796c725cc6e222b78bd497f6f1f525081419fe55c5eb7f2199c21abadeb9ed02291205aa0a5d1c685c6e4d5acb017384278974788e82f0409f003260016992454d91c9942ab4e18f655f0e83effb75673fe849c4af66ddc238aa1c6018721feda2f7250e2aec7718df3102927c7aa336e2f6c8a4ee68eddeb95ddb143153352a909e58c369c9737c646f25619664d0a6a09599424ceb628622e010fd9d836ccb9f766ac9e16d04cf5a6f531cfac77bdc57de5337e040e94bc2c1b03e19873b2802a6f3ef6974ade2765522c12c8256052a8228b4c03c16511308a3ce7b3a243e4ceb80eb49a1c2f952a9491b716a39d46fc4c9a421e09bc4974c12998693865e53cd82defc36295be358ae0cc52978fbe93a13d981245050f8809939be1ff1ff39e679ea1702d73c374efa73eedae64054ebd41ce0e0266281762c63e1306486db05f5977e35871719712cd58dc21c1bc25e5f4daede5396682c74f59b8fbed1ba1873442a417c89b60b7929ba14af54f7a2bdb6962bc074361bcae152b292c86d7104787381a4cd4251e55f664b40badd08378e83095412f5eccc3c9e2c59caec64e2b0b004b6d037e49ac1177ddaae13f84e23fcfd3003abfceb6d7657b5958b7f08b8adfd55cd1cca98235fc792b428715c8a77f27bdd8e37be61cde42b4bcfdc02ef47ca4cafe54555981c4e1ec2ce4985239f71733747cd551564946cd78517903c2bb1a204a53e146f9f993e0dbf57e85ab18a4bcc1c5caa34385a2ec6b36bc07b9bf6686b3e54dc1d8243549cec78b8d11ec1d1e5f16b993987583281fb7f58183e0708bc9db0629d0e97bf806322510808fbe9eed9c4c8145022b4958834bb252fd095df6a002365eac198d2eab86e3930a963154cd0c658e3a716d867fd4cc814b2941ce2837596e2c537ba51e1e993fa64c243ce74b1e7c8f8918e4ca69d61426498b972036fbc38149399b3362992178dc6ee7b5444b234366b7da53806791073160f35ae8f68e8198e988b5324f6209adb0e2bf8deca7694f223528034c654eb6edf4db49855c59e8acce0681f4edaa9506e90f642f31b8919bd3838126791a440cea79bea4fdce071c4b5d84e717c14fd64c5557d2ef6dbc240b4b24652cf5f6cc2213e1ed7b78f5f5948dc2081b8b1477b73e2235858a781a1876d630172e0bb248e3a870ba3c12ca246c4247af8dacba009b04ae93194f5124ee6004e3f3256cd4787d18e3ec91d9dd09b0e3c4980218d600339e285dcc0d2b963a2853b08e59b644743b433cae86bc43c192da83a1515930fe657c7464c12bf467868c9827bdcb4fb4a3faae41354edabf34b3f96fb01e6e6f90a4cf7e54eb2267b53d493177dfaf57dffc6e38b621f62ef9d", 0x1000) 01:10:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 1) [ 920.328006] loop2: detected capacity change from 0 to 41948160 [ 920.334880] loop5: detected capacity change from 0 to 41948160 [ 920.343811] FAULT_INJECTION: forcing a failure. [ 920.343811] name failslab, interval 1, probability 0, space 0, times 0 [ 920.345173] CPU: 1 PID: 7181 Comm: syz-executor.2 Not tainted 5.10.242 #1 [ 920.345949] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 920.346893] Call Trace: [ 920.347199] dump_stack+0x107/0x167 [ 920.347624] should_fail.cold+0x5/0xa [ 920.348061] ? getname_flags.part.0+0x50/0x4f0 [ 920.348586] should_failslab+0x5/0x20 [ 920.349021] kmem_cache_alloc+0x5b/0x310 [ 920.349487] getname_flags.part.0+0x50/0x4f0 [ 920.349989] getname_flags+0x9a/0xe0 [ 920.350414] __x64_sys_rename+0x56/0xa0 [ 920.350867] do_syscall_64+0x33/0x40 [ 920.351292] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 920.351880] RIP: 0033:0x7f26c16eeb19 [ 920.352303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 920.354395] RSP: 002b:00007f26bec64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 920.355265] RAX: ffffffffffffffda RBX: 00007f26c1801f60 RCX: 00007f26c16eeb19 [ 920.356091] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 920.356913] RBP: 00007f26bec641d0 R08: 0000000000000000 R09: 0000000000000000 [ 920.357732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 920.358548] R13: 00007ffe1c79efff R14: 00007f26bec64300 R15: 0000000000022000 [ 920.360171] FAULT_INJECTION: forcing a failure. [ 920.360171] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 920.361527] CPU: 1 PID: 7183 Comm: syz-executor.1 Not tainted 5.10.242 #1 [ 920.362302] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 920.363247] Call Trace: [ 920.363547] dump_stack+0x107/0x167 [ 920.364012] should_fail.cold+0x5/0xa [ 920.364451] __alloc_pages_nodemask+0x182/0x600 [ 920.364983] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 920.365676] ? kmem_cache_alloc+0x301/0x310 [ 920.366172] alloc_pages_current+0x187/0x280 [ 920.366671] allocate_slab+0x26f/0x380 [ 920.367117] ___slab_alloc+0x470/0x700 [ 920.367560] ? getname_flags.part.0+0x50/0x4f0 [ 920.368090] ? __mutex_unlock_slowpath+0xe1/0x600 [ 920.368646] ? getname_flags.part.0+0x50/0x4f0 [ 920.369169] ? kmem_cache_alloc+0x301/0x310 [ 920.369659] ? getname_flags.part.0+0x50/0x4f0 [ 920.370181] kmem_cache_alloc+0x301/0x310 [ 920.370659] getname_flags.part.0+0x50/0x4f0 [ 920.371164] getname_flags+0x9a/0xe0 [ 920.371283] FAULT_INJECTION: forcing a failure. [ 920.371283] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 920.371594] __x64_sys_rename+0x56/0xa0 [ 920.371611] do_syscall_64+0x33/0x40 [ 920.371621] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 920.371627] RIP: 0033:0x7f0d8d27eb19 [ 920.371635] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 920.371641] RSP: 002b:00007f0d8a7f4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 920.371650] RAX: ffffffffffffffda RBX: 00007f0d8d391f60 RCX: 00007f0d8d27eb19 [ 920.371665] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 920.371670] RBP: 00007f0d8a7f41d0 R08: 0000000000000000 R09: 0000000000000000 [ 920.371675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 920.371681] R13: 00007fffd1f2f40f R14: 00007f0d8a7f4300 R15: 0000000000022000 [ 920.383411] CPU: 0 PID: 7187 Comm: syz-executor.3 Not tainted 5.10.242 #1 [ 920.385107] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 920.387140] Call Trace: [ 920.387802] dump_stack+0x107/0x167 [ 920.388695] should_fail.cold+0x5/0xa [ 920.389632] _copy_to_user+0x2e/0x180 [ 920.390574] simple_read_from_buffer+0xcc/0x160 [ 920.391745] proc_fail_nth_read+0x198/0x230 [ 920.392808] ? proc_sessionid_read+0x230/0x230 [ 920.393926] ? security_file_permission+0xb1/0xe0 [ 920.395114] ? proc_sessionid_read+0x230/0x230 [ 920.396235] vfs_read+0x228/0x620 [ 920.397088] ksys_read+0x12d/0x260 [ 920.397962] ? vfs_write+0xb10/0xb10 [ 920.398880] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 920.400178] ? syscall_enter_from_user_mode+0x1d/0x50 [ 920.401437] do_syscall_64+0x33/0x40 [ 920.402348] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 920.403612] RIP: 0033:0x7f55a128669c [ 920.404521] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 920.409030] RSP: 002b:00007f559e849170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 920.410898] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f55a128669c [ 920.412640] RDX: 000000000000000f RSI: 00007f559e8491e0 RDI: 0000000000000003 [ 920.414373] RBP: 00007f559e8491d0 R08: 0000000000000000 R09: 0000000000000000 [ 920.416117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 920.417856] R13: 00007ffde9396a2f R14: 00007f559e849300 R15: 0000000000022000 [ 920.427453] FAULT_INJECTION: forcing a failure. [ 920.427453] name failslab, interval 1, probability 0, space 0, times 0 [ 920.428850] CPU: 1 PID: 7179 Comm: syz-executor.5 Not tainted 5.10.242 #1 [ 920.429627] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 920.430565] Call Trace: [ 920.430863] dump_stack+0x107/0x167 [ 920.431280] should_fail.cold+0x5/0xa [ 920.431728] ? create_object.isra.0+0x3a/0xa30 [ 920.432248] should_failslab+0x5/0x20 [ 920.432678] kmem_cache_alloc+0x5b/0x310 [ 920.433146] create_object.isra.0+0x3a/0xa30 [ 920.433690] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 920.434269] kmem_cache_alloc+0x159/0x310 [ 920.434745] __d_alloc+0x2a/0x990 [ 920.435144] d_alloc+0x46/0x1c0 [ 920.435526] __lookup_hash+0xcc/0x190 [ 920.435970] do_renameat2+0x51f/0xbf0 [ 920.436409] ? __ia32_sys_link+0x80/0x80 [ 920.436881] ? __virt_addr_valid+0x170/0x5d0 [ 920.437383] ? __check_object_size+0x319/0x440 [ 920.437914] ? getname_flags.part.0+0x1dd/0x4f0 [ 920.438453] __x64_sys_rename+0x7d/0xa0 [ 920.438908] do_syscall_64+0x33/0x40 [ 920.439334] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 920.439926] RIP: 0033:0x7fa96fa17b19 [ 920.440351] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 920.442464] RSP: 002b:00007fa96cf8d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 920.443338] RAX: ffffffffffffffda RBX: 00007fa96fb2af60 RCX: 00007fa96fa17b19 [ 920.444161] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 920.444978] RBP: 00007fa96cf8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 920.445795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 920.446611] R13: 00007fffc4cfcc4f R14: 00007fa96cf8d300 R15: 0000000000022000 01:10:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 8) 01:10:22 executing program 7: getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000300), &(0x7f0000000400)=0x4) r0 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x40}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f0000000480)={0x4, 0x80, 0x3f, 0xbf, 0x79, 0x8, 0x0, 0x2fecccd8, 0x800, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f00000001c0), 0x8}, 0x100, 0x8, 0x8001, 0x9, 0x8000000, 0x1, 0x7, 0x0, 0x8, 0x0, 0x9}, r1, 0x5, 0xffffffffffffffff, 0x2) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x10000, 0x5) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x1, 0x0, 0x0, 0x20020, &(0x7f00000006c0)=ANY=[]) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="07000000d6838a9b5c27ff0100008030"]) syz_io_uring_setup(0x26d5, &(0x7f0000000380)={0x0, 0x9b7a}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0), &(0x7f0000000340)) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) fcntl$setsig(r3, 0xa, 0x1c) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) openat$full(0xffffffffffffff9c, 0x0, 0x325140, 0x0) [ 935.276403] loop4: detected capacity change from 0 to 41948160 01:10:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 9) 01:10:22 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 28) 01:10:22 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) [ 935.310037] FAULT_INJECTION: forcing a failure. [ 935.310037] name failslab, interval 1, probability 0, space 0, times 0 [ 935.311479] CPU: 1 PID: 7200 Comm: syz-executor.4 Not tainted 5.10.242 #1 sendmmsg$sock(r0, &(0x7f0000004100)=[{{&(0x7f0000000200)=@vsock={0x28, 0x0, 0x2711, @host}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000280)="87f36b5cdd0a3a412befb7801ca166b2e3c05608510507a2de0ebe82452138a0ae68c47f5a4e2a65706b4ae9a81c7c0dd52a1c0f9dcf56bbefb628ebe53a19e9e0ca0090607ac96c7d86ffff21e6d1e4d41da6", 0x53}], 0x1, &(0x7f0000000300)=[@timestamping={{0x14, 0x1, 0x25, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0xc5a}}], 0x30}}, {{0x0, 0x0, &(0x7f00000028c0)=[{&(0x7f0000000340)="2c696ccb8eac26cebf221fe3f54677de9713dd7b1f6144adbcd169041ccd7068ecd853ef187aef8c6fbee443dc8aa37cee623227935146b6aaa4ec9ccc9aaf5c2c283e41a2a206afda9cd04daabc49df8d47ffbeb97cf8386635e1cdc59a058a65895f17f820c59cf5e6336d4aec08be7ba31e3a17a3def54230250ad1d43fe8c827faea14e7e936c2f3190ddce62144d80d3d6e7a2679744d9bd29212c3bfd8eda010aa09b28609da2e5ab331e46b70207da9111dfdd56c7c092082bf011d", 0xbf}, {&(0x7f0000000400)="e79fa68b14bef97bff7f6d73de21a2251e79dc0ba338a62751c006e9ebe1769af3f56254a4b421a8d54844ba7850c4e0e2aafe12f6b1c11225e390aad50382448e3113e4ff56ced7c98ccde3a9fafc66104c", 0x52}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000001500)="24040d71b93e853ac1eb29982505b4e2cd9321778d80ed4823fc972eaf696b15ae1767e74a7d10b581a1a8971cc859ea1104d5a48dae758fefb301d563ba15e7ba8ce0b6310ec6878c4ebfcecd12f9be97330e5cd77721c92813f36f1fce26cbdbbfcc37f08190e8b113375624713eaee3d84f106ace9349acfba48480cb3c51686a79fc90f2751872a264f8bec2e5a8075afc4c7369782b6d3d1a6f395ef45bf77d417b53c235e0f91ec062b7ac3b1d1e69e847d52cb99eea9e46109b0fb62b4812f7a760ffb7f539e19b69286a867b3ef3b5db96ce402f75bd8cef0e6411847efaee75fd21bae0d3e0abc8d9333e8a84de63f2513a16be49e3d65a5a8aadc7b126816912e35262b08786534e44a155c6835bb4aa074749ade959601aa019a367708f520d3d3468a8aee7da61f0ab53fdeba4bfbb0c8350a6e9920086eafabf45136b246671e117da171f2974b87ebe2ec1e8b59c1082dd22dc3f41cb8779545db676121f69567a3da13fd0b9b5fa22cbfd68b1d9cde525864d99b6367d00d565c5257f9116c5747384aceeb66e92c24dd567c36054a291ef6e777455e8e9af87f3bf10ac962d4fb12f0ca086902fd824b53a9c890b8eb549719e31dcd4a9b5b9f8389076b2a254ca783995c75cf720915da9f002a446e2cdbf442d9568d8c457b5fd36ff703e6a8e9ca5a8d24307463914ef624fe0e3fdbca8a4fc49e4d53c9c1a91bd5002d7182ef12eb07a2c94270972d3be0d3e453a4beb200318c69855d683d33234c5f47949899703e1ae76412ebbbd4c7fc52b68ecf5ef237849bcf0758e50c4bec783a83d53fa79e1cf0aca5cba1334d8cbabda657e11734761ada3c33b32a1f4224b44c84c746447806a46e87f2d03920db27a76d4d0ef3925cba83933e5b32fe98267c62fe5b57f906812da3a69b22d06a6b428755a0fa9cb564c4e2d8c99d127db2edfaf3c44864fa780e2954f9787cd605563a49e2c6fad5c0b98f0ec2a1d1af340c980c7c2a31b838c8d0909a35e0afb4f506efcba6103ad608a0a593ae278bcb88431b802ef7b10df1f540170a0779baba8a80bdf07c69effc47b8f422484c1dd1b7c0a5ba88402f3a6846266e909a1c2b67501c9bf3057dc39001a34bec5337f1ce755486d9e41d6498c5f6a0074f46937d679a668f333f43b1c31bb6d39a6fe4898bec856b6d340ced880a1ffd485cc8b14ad54048e96bbf0dd2425172b2e5c61ecd160b8e8b774261ef0dca93b6bf82d22ac8f056023d1b777d23a41c7765a295eae32dfe578c893def2a0c0b33a295058306b9f7a4fad25455fcf240f1d80cc479ecec7278a840d37e328aa5404fd0a1ff008ccffa3053659a76f01de489df7a27458e169cf270801a2c6f8033f7a8e6337fe40a3f0e851b3899aba247f6fd4fc5db328f3c6fb35f2cdb98e8409ac26fca50eead82a97d3df65ad07cdc64ddbb4499170369fc2b4fe17184db33a0a4fbaaee7305239bbebde15d9198c5e6b3af00ac926b651e839e3f11cd804a7003e6014eab04563998c46c25edb3ede8206dc7f4be970396c082a7f809b513762a7ec9407ad2cf26f5b5f96d1a4d7edb4bebac4288098b6a02dc49c32635c65794782efea26503e8df8fa5024a19db5b582c5258e3e7ba1528d74c351006c2f62501881277b9bd5ed56e3a3b068435b777d4bd2123aaa44ac68387a379bcfe983feddbbe63075cb4dc040d9d74bf598cd497f84378836468b84645d3a7db359bf72c791ae7eac11095bedb5d1af7a6b06aa7318b68fa8b6cb23bb66b7a060d8a7e42e0b067f7f401529c28c9fe16ab3e95b63412b5d92580d2d2376ec7b672229f17ae1b83fcc4137b3a128353241f4048b177d5102b3dec7c4f48173e314dcafda36aa6bcdd317dbf2931ed39494bd2c32f6620366c12582ee8eb662d577e9872b11bc8612876ffde8976da4055d2f52deb2483d8caf1f98f3bdc680da4599a329c0848358d875f0a148f85af897db81609dcb5d8868278719576450999606ed8bfc6b8d817270dc6ebe2f318ba66b78fb0ee0d8dd4edba3c6d685a285ee10e78c2ba0d6a1d165348a8d5e9162ca2b4b6fd03d73cee7eaf16cb01c8213b6eec6eff60f8998ac07fd02569f9e01f30d821d21f97193f674a5e84e8e7584e9a4bc5fdadfb830df56db10828b8ac6bee0a4ee83fdd32e09034d4c0cea36f3e567be084c6b0e2b00978f67d49377cbc4041acc65d3c2210ef44a395567203972bb8267c216bdf5f39b307b4d8f3b986283b1ab37ead35f93cf4ccec04cad589d40e429d8054ddc9059f861533cbd2f9cc4c53c75a32cbcb14923fbffb0bb5840687e0d8d99798fc56a0b770897df0d39b1d3943389aa3aa9c0aed49264d05ea0981ae175877ca2ec02b4cedcb63f8f78190cc90b4755fdbadf7907ee3fcb83c20812658f168e04d0be37035da8297972a2cfa15053206e587293f926bfc1eec84373cd5fba64c40d75e2ebbcd5be1fc96b708c14854e0539fe9472c6a89f0b31565e9a9e48740c69e4cb898bfef6b9e061210731ed1a63758bbe148bba2659b042df82a9692e48f957c48e25e3352c8cb2b13e8c84f344718c1bf3c40e102a258376e25e14516e33184f38ee27169ba47966f68079a566acbebeebe1042f9b700968dfb73d69529fa8f80e5a5f2e170c879c476b0462df349e861bd840b82452c6b53f1d2de2f8fee9fcc52435e3fc4c44f3968ade9c2d6e8d2ffff97c7af3e9e88b0a3f9f567e5185b341f266f9651ccccb114478ed3dc86ff042853e8bb779ff441e86915adc6cb8c71174934429b214e7c5adcda23d2369b1f4c9dd826f1316cb8f26d4abf8e34813dbf181b759ca49a41098bc43ccec958f3a500d6f5426b6f76cf7a206c075166d53a2f7334576a9526c7b7725c3e80daba20e2e84e4cac7ed4ca7088eecc8aa164b721c1df085fbb1afbf1d381532ebc375aba7f7ec1a53a1a84d151ca04c6e8f729362100438a7a197dbcfa848e3d8009dc664ac003f60d840d539a984bc87cf40766bcbee7c15f8ebdd8b6c7256edf505f99153137eca8fe9b3792f6376c4055bae500c7c296c921b12df4ff1ed4922522c446e55b8cfacb6ac48d48fc89e087d8f3415dd779b94c2f413feea4d9e53748e9fbf97a600f6a31691547e96c0d0437f436e287b3e3bbac2b24e0b2690b4c7c12feb84913122745e275c68a82ee1ba8ba8eabc20e6abfe19d00e55b9921ca540c2e057f1e42b1a98145f30cea0646bf0909ce76d338002b44da0c19fef1d5b926e7af54e890ee183097bf6811f10084a38a8f78699693da0c876e65e5ba33d0b340be534f8c9116a23e1468b15d7804a69c7c0588adfb62d9b1a569ee1e0551b326d415b964240df50dc112cae618b9cbc1d8c6261670a2df09c1f107b9b5afa9dc57b305b97a2550bd366ca1a7b1be92fbde0c630081b6da7bea1f092b8c96abf7b3100a04ef12f644e82093c81107943e012ce1ec52d2f51af804d878ae982bed085e6df7a4c005d669e9346adaed4bdb6cb1e424761a87970891d1cdca9843768c0ee317d59e7a5ab4df42255d8fca42b37c985c7ac53fb54caf6d82eda37069cd4a5abf0eb9e704f5fda6dd40f0b3a27fc24bcf56f928552279fbee3e9aa7c4715e7b25206930e290d7a660091efd7972d0a364ebcae26479f603314dae6cda8bb0e51298f114bc15a2f713794bec38dd52fd90962cdaef0cddb1b50278dbabeed764ff6d758345c906c0b35824d4e78e4eaad03bdb70514c41fd85070ba21a0e7544fae0f12bcdc65c926c60d77188d4a77e20a57bf8e2106518d8f26c3e01cd83368d856318a470a107f054b2c7ac4b3d8a1382ac1d8ac315a0ada477525442073a75f9b67d9d66c081cc800554ead4c9adfcb58d76cd0bc8b884ba63f27d03595ae2bfadbd7dce74e22788af990b3912d814c9038379798961775821d6bfae406763b74f5288a1d69ff55bd0f4ce3146f3a6ee5fe9d5a9cfd2de163aecad1cdfc1b600c01e704e8e87002622c18a4c254236c14b9e2194f9d2e2ec2c0da5b295f2cabade30b8ff0cd41eea083d089c8a1b950426020a07bec4c1777579e1b7fb95af3a1762cdebe6e3f8641b72aa22b20f751ab24f8f5fb808967c7f0c744c76ef98f87c733fc95e430e09aa962192781bd8d4ed789a33ac06c64d24182fdc24341f3757aa1d4ac1c280dda908aa17462121e06f14ce0e5ecf0d4207d9abb1f4a1be1187b9dead9dfbc96770392b2a681dab18d8b04f8e7e7a376c39e1acadda831812063abd29bd707a334d6fd0897659ec999a19979cc7a06ece24a74c1b3327c727cf487b9a0d51728eec6fd7dc802cca46ac5a4a9d7a4f3e8d87ce0d2caf3ea866e43643beee3aadbb5206596f010447d088571712105c419869995d993f3d17c54ba642f0e72f3072a67ec1225ae26d9fea837d685c8fc1b25a61fa52e7492a5efb3af7f7be8c05b23b17f9b3f3bafca8627c8547e7d512931bdfe4089de73fde5b94d057062801a569e88f54efdbcb53ead0fd25cc8f80ac667511d2779aa4c9f9998e3d2acf7012295cf572c9b4da3c0246b6eb0c76c509b944e7818c359e9773a4edc4cf12173216ff67ea6cd4dd9991e8f6209b12f2c5098a47a06f630eac4496769c10eaeb1eedb2c6541bfb28940ae85b22428672e6615f2d53bff3ef4fa23e8a4894c7f51195c0e289a556aa73354a0b814abb05e9d140a1ef07061670b439c11b1f46df43e262a2c6ca9be425eda1321c7762e511bddf09a2c9e3b3e58e06159bf447d4e13174d2607144061b58b51fdc525e776249561d1189be99bcf2733543f841eba2a728a331568e277a48c0d4c7da8c92309ee834c975b9bbbcb6e2bb13cee80b3554962c194ad4b87b7c8d39da39e9043db30fab1547ba96a99493dff9f9eb6988d97f11abfe1c9edadbf3a13cf1ec36f58c1b04e11878fee1aed0329dcef4ead08c5367a990f15040d7030495dd658e964e9b3beeda05cd5a0cc1a25463992cad5b2b1ccfcc3837ec14deca22a2e7280f370d8eea983b32804e18331ce4d3541bef1b666374e1d44e64704ce907a21a0cfb3182d72b5378322d03e7a97d04127622fc7b1a0cb21eef30f3c83f8556b309258f007d49e2bdfa60aadaef8ce1a632718e68800cb68d5e0f1592ed3c5315f9888d801598486bc553c45f2d3dd4dd63d22132ad3e540546174d00bf9326df6370a445527ffef50ba09c7fb2f28847f446e84735ddcd8a4403ddf4db60008064dea23f6b46629a0411cf7e20f97a5bbaac8421f5f7b55a713d11fc3c89cb9dc3fad3d1f8e5186b8a05c3fb5fc9079e620d75df08ac1521515e34281a72e187f6b0706c0590c0dfbbe5b76a0acddf1af87eddf02bbaa569a82b09e77ed3f43593227d0d845a61022185a30bf4e222f9415c3c7058af626734c6f5033f93b9dd0d60c69ce2a9138957f342351bfb2ed420fc632bffbc08ed1a1b233482cc7fd92bf07aacda7d0b5e6385b79fe91a607590cbebe31c787276c8e2bbdd1d75ffd81781aed21873ebf63f8c995e27b52174abca7b07357c42bba11f6f5599d833ceaeb4740049a354d4b98fd8582ff6627ab1c6137b1ffe6424e2bce2a8f725e79a05d3509b012991a3084a2979f91344f1c1e9b112a0af4c7df2c9319bd08f60dca510b995bbb491624cf47265e48e656e44fcae1528870c82b45aea8bc5ec6b483d4a424f54b257d1d8341957e7027e16ec9cdc89b6da493c4c392f8193f3d20cde0829e337e6414efe4c0af3e15a4d8d1", 0x1000}, {&(0x7f0000002500)="8fba0f94bde2536e00dd11918856c611d98d19e441614f992d2248e8a5960d8702dd40964605b07e8027189b522cc3841f5f57952f9dbbd77981be92d34571d3a6", 0x41}, {&(0x7f0000002580)="773425fda32c0327fbc9e5ad67b57ab02b4d115d8c1f0da1bb732e812570a583a6aafd97265c9cf2e6fed4d423298e474e8b50718c2adfaa9f1ab2f9e0d0bc24405bd4817dd86b97b9040c680c50", 0x4e}, {&(0x7f0000002600)="59d97d235e8dc2a1b843bd097b7a6efb21ddd16a65c394e8a4f69d6baf91b11d1c7185ec9a55cd4aec65356d41fb9e7798a0521f91b5dc8def941f095278c182340caad8e5e345f8f2591881d123cabe5b638f4c7f792e2f59ecc37d019745d5e0bb7407b0e4f9ca9623a2feafd30c28c0038377dacf81177f2e42cfe141c8341a22086b9157f8b25fb3b69b9adf2ffa24a4d1405b3bc853ad9dcee00eeb3c55a17b502b5e19c8233f0bc53fc9b5f218df3c32c5b9c518c4fa154a194da24e66d265e44bc65c983dbe91ea375ddceefd9b9e4457c7bcdd78c8dcfdabb7a83a02dbce4e57d84ade02ac", 0xe9}, {&(0x7f0000002700)="e3b75fe801be989d5428716aa6c57fa0b186a25c9bd5d31224dfc4a378c23e2f947896531516ab54835b0f3abba66544473bdd67c4b7c04cbd7c0e508f556af42fda4bc21411cb2270d640b8922d69d0a38e4736751e225286b861f8ee27461eef95c7ed505f9c1c375e83a32dfb092a1beb534e60f2022080ce954ccb6b17ce72c9777168fa787cfebeae4ad62f7e5e48c6f8dc6fe662cb5d31b4d1e26081cb40a96c0de2c3df673145dacc5684a801c118fdb33cb92241673daa912175383c85a2afffe799958f687fe6a8a5de3f43", 0xd0}, {&(0x7f0000002800)="d6d88f7a486a919609e73ca50428e16030b94165c15d57e4ef03cf6b7750421d504c34cb67a0af6274864fdfdbec4dee3fb25a4f7670739d0bc53051f32879e7fda3d838195be7fcb6db7a6b11ccfffdd7819879ff164cda8e882529f3a945a4e46572a2ca61251682693dcbd5e9cbe288645cdd1de8b0620d25647893827629d713859ef6011a765b6a8c0e3a8cc7cea30bf69cfabd1d72660457349649b57e20c6ce82fa", 0xa5}, {&(0x7f0000000480)}], 0xa, &(0x7f0000002980)=[@txtime={{0x18, 0x1, 0x3d, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0xfc0}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}], 0x60}}, {{&(0x7f0000002a00)=@nfc={0x27, 0x0, 0x2, 0x6}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000002a80)="a01a8c9cc44a773ecd256e0679258bd65816cb06a2ba966d047ee5f239d4ca788fbb5ba14574614a7ccb48dd", 0x2c}, {&(0x7f0000002ac0)="0766da5b075517eba915382a0b8645f0157a52c2acf619550a44a3b96a0657803d42f41e7426a368030f125430eec628a290bb0386ad8f3896dd178b701ba91a91c739d69df1de73abf7cc2593b8b31a66d03c66e43f5cae899820735c86cf98423f82a9ca6a873f9ddf5e67e8837e23cebe56b3b4b567c7b20f3eb9345b4be25e2a95ab22f31f73841c20ea2dbfc02f246a78de09c0da82c0eb284287c80fdf09933671220655b934bce24b2f4dc183f0", 0xb1}, {&(0x7f0000002b80)="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", 0x1000}, {&(0x7f0000003b80)="576cb17c2274166e932ae6e6feef418e3b0fb1d25a91747c", 0x18}, {&(0x7f0000003bc0)="43c2e320a92681be5df266d89d2ef0e3db984973c5513950044f33831db9545b122c983dd92f14c882a228dcca30386aa4c85477339293d6d2bd51ba383b98e9a62accce3e70dad4b18c5e0d8c868229db4248b731f7833bd70351ebebd31a11d8a693169b7c4c4f58d7228508b77d0cb0a5f4e05aa31d4e1123487f4fdf4e3abb8f227de0c5eeac1f258804ed9f", 0x8e}, {&(0x7f0000003c80)="5c90458618fd88dda59b1f778eb16a54844a4823787acf929a5a8b9dca03ad28d6494fa405cf919d813d79993594cf0980b081085935054ed3cd9992753a2873ff64963abe3bfc2759b9d64622b37492eed8f91c4d21db937e396672a09ea5a35387465a4c6d55f3c3d075eb5243ca9f9dc6ddc3f0827c0be51cdd7f30f348679e29a35e40408b7569418a845dcdb4c8dbdd34f399ada41d95cd041c47c38d0c16056216b19fc45c009707ae38a423c79b8a1799e9fff9ebfdd87464", 0xbc}, {&(0x7f0000003d40)="ee0b19d0c3931ea2f86ce280be735d2e744d807f2c9c0c3c222d02cb8f3c60b79d56f298c74f0987d1544fa1c153808246b82db18af2d9673b3b56dff9efb8736b9928dd6673da265633c90330e7bcb36353a8fe8c053dd2fc0e35aa74eacb164e2ccb487fe4cca41b35c43554be27fd6f5af6387c2931874152ea30ed4b9a6e29bdf6e071a8f80b0dd1a7fd8f253c177ecfe49f85fbcb7309c3bfb8fb2603d6383c6cac8e93851efb1f362f48616760108c2b455c9ab80f5c754d42473382312a9df6714c0fbbf891420492b99b0bc29306cad65204f4cb57dd525adec2fb6b6e5c9d83a857a99b42dd6897d5f327554f738f1dba83631b", 0xf8}, {&(0x7f0000003e40)="069bd81e8a22b7dc1953a99bd2547c71543ba12589bb", 0x16}, {&(0x7f0000003e80)="f745527b955f457faeaf5739c6bdc046d065ed118c55b11f84e49873e33694cbc8dc178b2afa3019d1f9bd254a9b2f61441ec9ac248df58e1b91d95e9e3768664d41488bb2b441568ab31198f6ab0bdaf5104015d54efa207d8ffca4bde24367c4cb33247c3dbbccedd2cad7a3633a51dc9a7842aa8ad239103b8656fd4b3ad7a55f55183196d6949c6144f9740e146ab78384a819a5e23646ac90585b83859024086317b856abd4fa4b0f8f3659dbd04a2c2c55909aeee677dc038cb2da1efeca8214", 0xc3}], 0x9, &(0x7f0000004040)=[@mark={{0x14, 0x1, 0x24, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x1000}}, @timestamping={{0x14, 0x1, 0x25, 0x7ff}}, @mark={{0x14, 0x1, 0x24, 0x200}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @timestamping={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x5}}], 0xc0}}], 0x3, 0xc00c044) 01:10:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 3) 01:10:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:10:22 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 2) [ 935.312507] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 935.313965] Call Trace: [ 935.314409] dump_stack+0x107/0x167 [ 935.314962] should_fail.cold+0x5/0xa [ 935.315544] ? create_object.isra.0+0x3a/0xa30 [ 935.316240] should_failslab+0x5/0x20 [ 935.316828] kmem_cache_alloc+0x5b/0x310 [ 935.317449] create_object.isra.0+0x3a/0xa30 [ 935.318105] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 935.318875] kmem_cache_alloc+0x159/0x310 [ 935.319504] ? __d_lookup+0x3bf/0x760 [ 935.320100] __d_alloc+0x2a/0x990 [ 935.320624] d_alloc+0x46/0x1c0 [ 935.321130] __lookup_hash+0xcc/0x190 [ 935.321708] do_renameat2+0x51f/0xbf0 [ 935.322297] ? __ia32_sys_link+0x80/0x80 [ 935.322916] ? __virt_addr_valid+0x170/0x5d0 [ 935.323581] ? __check_object_size+0x319/0x440 [ 935.324132] FAULT_INJECTION: forcing a failure. [ 935.324132] name failslab, interval 1, probability 0, space 0, times 0 [ 935.324299] ? getname_flags.part.0+0x1dd/0x4f0 [ 935.324323] __x64_sys_rename+0x7d/0xa0 [ 935.327829] do_syscall_64+0x33/0x40 [ 935.328265] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 935.328858] RIP: 0033:0x7f17f2c8cb19 [ 935.329287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 935.331435] RSP: 002b:00007f17f0202188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 935.332348] RAX: ffffffffffffffda RBX: 00007f17f2d9ff60 RCX: 00007f17f2c8cb19 [ 935.333182] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 935.334041] RBP: 00007f17f02021d0 R08: 0000000000000000 R09: 0000000000000000 [ 935.334877] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 935.335709] R13: 00007ffcb391048f R14: 00007f17f0202300 R15: 0000000000022000 [ 935.336583] CPU: 0 PID: 7209 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 935.338139] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 935.340018] Call Trace: [ 935.340614] dump_stack+0x107/0x167 [ 935.341454] should_fail.cold+0x5/0xa [ 935.342345] should_failslab+0x5/0x20 [ 935.343226] __kmalloc_track_caller+0x79/0x370 [ 935.344294] ? match_number+0xaf/0x1d0 [ 935.345194] kmemdup_nul+0x2d/0xa0 [ 935.346016] match_number+0xaf/0x1d0 [ 935.346880] ? match_u64+0x190/0x190 [ 935.347740] ? __kmalloc_track_caller+0x2c6/0x370 [ 935.348889] ? memcpy+0x39/0x60 [ 935.349663] parse_opts.part.0+0x1f3/0x340 [ 935.350649] ? p9_fd_show_options+0x1c0/0x1c0 01:10:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 9) [ 935.351698] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 935.353019] ? trace_hardirqs_on+0x5b/0x180 [ 935.354016] ? kfree+0xd7/0x340 [ 935.354787] p9_fd_create+0x98/0x4a0 [ 935.355646] ? p9_conn_create+0x510/0x510 [ 935.356620] ? p9_client_create+0x798/0x1230 [ 935.357636] ? kfree+0xd7/0x340 [ 935.358394] ? do_raw_spin_unlock+0x4f/0x220 [ 935.359418] p9_client_create+0x7ff/0x1230 [ 935.360419] ? p9_client_flush+0x430/0x430 [ 935.361398] ? trace_hardirqs_on+0x5b/0x180 [ 935.362390] ? lockdep_init_map_type+0x2c7/0x780 [ 935.363479] ? __raw_spin_lock_init+0x36/0x110 [ 935.364549] v9fs_session_init+0x1dd/0x1680 [ 935.365541] ? lock_release+0x680/0x680 [ 935.366470] ? kmem_cache_alloc_trace+0x151/0x320 [ 935.367582] ? v9fs_show_options+0x690/0x690 [ 935.368620] ? trace_hardirqs_on+0x5b/0x180 [ 935.369623] ? kasan_unpoison_shadow+0x33/0x50 [ 935.370682] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 935.371873] v9fs_mount+0x79/0x8f0 [ 935.372703] ? v9fs_write_inode+0x60/0x60 [ 935.373664] legacy_get_tree+0x105/0x220 [ 935.374612] vfs_get_tree+0x8e/0x300 [ 935.375478] path_mount+0x1490/0x21e0 [ 935.376382] ? strncpy_from_user+0x9e/0x470 [ 935.377386] ? finish_automount+0xa90/0xa90 [ 935.378390] ? getname_flags.part.0+0x1dd/0x4f0 [ 935.379478] ? _copy_from_user+0xfb/0x1b0 [ 935.380459] __x64_sys_mount+0x282/0x300 [ 935.381401] ? copy_mnt_ns+0xa00/0xa00 [ 935.382311] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 935.383534] ? syscall_enter_from_user_mode+0x1d/0x50 [ 935.384747] do_syscall_64+0x33/0x40 [ 935.385614] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 935.386815] RIP: 0033:0x7f42b2db2b19 [ 935.387679] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 935.391989] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 935.393764] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 935.395409] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 935.397060] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 935.398705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 935.400358] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 935.404686] loop6: detected capacity change from 0 to 41948160 [ 935.411955] 9pnet: Insufficient options for proto=fd [ 935.413674] loop3: detected capacity change from 0 to 41948160 [ 935.426115] FAULT_INJECTION: forcing a failure. [ 935.426115] name failslab, interval 1, probability 0, space 0, times 0 [ 935.427698] CPU: 1 PID: 7223 Comm: syz-executor.2 Not tainted 5.10.242 #1 [ 935.428736] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 935.429969] Call Trace: [ 935.430386] dump_stack+0x107/0x167 [ 935.430948] should_fail.cold+0x5/0xa [ 935.431536] ? create_object.isra.0+0x3a/0xa30 [ 935.432232] should_failslab+0x5/0x20 [ 935.432790] kmem_cache_alloc+0x5b/0x310 [ 935.433392] create_object.isra.0+0x3a/0xa30 [ 935.434033] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 935.434788] kmem_cache_alloc+0x159/0x310 [ 935.435405] getname_flags.part.0+0x50/0x4f0 [ 935.436063] getname_flags+0x9a/0xe0 [ 935.436609] __x64_sys_rename+0x56/0xa0 [ 935.437197] do_syscall_64+0x33/0x40 [ 935.437748] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 935.438501] RIP: 0033:0x7f26c16eeb19 [ 935.439045] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 935.439314] loop2: detected capacity change from 0 to 41948160 [ 935.441771] RSP: 002b:00007f26bec43188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 935.441787] RAX: ffffffffffffffda RBX: 00007f26c1802020 RCX: 00007f26c16eeb19 [ 935.441794] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 935.441800] RBP: 00007f26bec431d0 R08: 0000000000000000 R09: 0000000000000000 [ 935.441815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 935.448484] R13: 00007ffe1c79efff R14: 00007f26bec43300 R15: 0000000000022000 [ 935.450637] FAULT_INJECTION: forcing a failure. [ 935.450637] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 935.452357] CPU: 1 PID: 7224 Comm: syz-executor.5 Not tainted 5.10.242 #1 [ 935.453145] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 935.453169] loop5: detected capacity change from 0 to 41948160 [ 935.454075] Call Trace: [ 935.454088] dump_stack+0x107/0x167 [ 935.454100] should_fail.cold+0x5/0xa [ 935.454116] _copy_to_user+0x2e/0x180 [ 935.454136] simple_read_from_buffer+0xcc/0x160 [ 935.457523] proc_fail_nth_read+0x198/0x230 [ 935.458015] ? proc_sessionid_read+0x230/0x230 [ 935.458526] ? security_file_permission+0xb1/0xe0 [ 935.459073] ? proc_sessionid_read+0x230/0x230 [ 935.459585] vfs_read+0x228/0x620 [ 935.459995] ksys_read+0x12d/0x260 [ 935.460395] ? vfs_write+0xb10/0xb10 [ 935.460819] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 935.461409] ? syscall_enter_from_user_mode+0x1d/0x50 [ 935.461991] do_syscall_64+0x33/0x40 [ 935.462410] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 935.462991] RIP: 0033:0x7fa96f9ca69c [ 935.463410] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 935.465484] RSP: 002b:00007fa96cf6c170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 935.466342] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa96f9ca69c [ 935.467156] RDX: 000000000000000f RSI: 00007fa96cf6c1e0 RDI: 0000000000000005 [ 935.468000] RBP: 00007fa96cf6c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 935.468800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 935.469598] R13: 00007fffc4cfcc4f R14: 00007fa96cf6c300 R15: 0000000000022000 [ 935.472694] FAULT_INJECTION: forcing a failure. [ 935.472694] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 935.474024] CPU: 1 PID: 7227 Comm: syz-executor.1 Not tainted 5.10.242 #1 [ 935.474805] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 935.475729] Call Trace: [ 935.476046] dump_stack+0x107/0x167 [ 935.476453] should_fail.cold+0x5/0xa [ 935.476884] strncpy_from_user+0x34/0x470 [ 935.477350] getname_flags.part.0+0x95/0x4f0 [ 935.477843] getname_flags+0x9a/0xe0 [ 935.478262] __x64_sys_rename+0x56/0xa0 [ 935.478706] do_syscall_64+0x33/0x40 [ 935.479126] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 935.479697] RIP: 0033:0x7f0d8d27eb19 [ 935.480130] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 935.482188] RSP: 002b:00007f0d8a7d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 935.483039] RAX: ffffffffffffffda RBX: 00007f0d8d392020 RCX: 00007f0d8d27eb19 [ 935.483860] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 935.484656] RBP: 00007f0d8a7d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 935.485455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 935.486255] R13: 00007fffd1f2f40f R14: 00007f0d8a7d3300 R15: 0000000000022000 01:10:22 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 29) [ 935.507003] loop1: detected capacity change from 0 to 41948160 [ 935.552545] FAULT_INJECTION: forcing a failure. [ 935.552545] name failslab, interval 1, probability 0, space 0, times 0 [ 935.555145] CPU: 0 PID: 7233 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 935.556672] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 935.558500] Call Trace: [ 935.559099] dump_stack+0x107/0x167 [ 935.559915] should_fail.cold+0x5/0xa [ 935.560760] ? create_object.isra.0+0x3a/0xa30 [ 935.561771] should_failslab+0x5/0x20 [ 935.562609] kmem_cache_alloc+0x5b/0x310 [ 935.563521] create_object.isra.0+0x3a/0xa30 [ 935.564514] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 935.565644] __kmalloc_track_caller+0x177/0x370 [ 935.566675] ? match_number+0xaf/0x1d0 [ 935.567548] kmemdup_nul+0x2d/0xa0 [ 935.568356] match_number+0xaf/0x1d0 [ 935.569178] ? match_u64+0x190/0x190 [ 935.570004] ? __kmalloc_track_caller+0x2c6/0x370 [ 935.571071] ? memcpy+0x39/0x60 [ 935.571817] parse_opts.part.0+0x1f3/0x340 [ 935.572763] ? p9_fd_show_options+0x1c0/0x1c0 [ 935.573767] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 935.574938] ? trace_hardirqs_on+0x5b/0x180 [ 935.575911] ? kfree+0xd7/0x340 [ 935.576644] p9_fd_create+0x98/0x4a0 [ 935.577468] ? p9_conn_create+0x510/0x510 [ 935.578391] ? p9_client_create+0x798/0x1230 [ 935.579357] ? kfree+0xd7/0x340 [ 935.580086] ? do_raw_spin_unlock+0x4f/0x220 [ 935.581064] p9_client_create+0x7ff/0x1230 [ 935.582017] ? p9_client_flush+0x430/0x430 [ 935.582949] ? trace_hardirqs_on+0x5b/0x180 [ 935.583912] ? lockdep_init_map_type+0x2c7/0x780 [ 935.584969] ? __raw_spin_lock_init+0x36/0x110 [ 935.585993] v9fs_session_init+0x1dd/0x1680 [ 935.586964] ? kmem_cache_alloc_trace+0x151/0x320 [ 935.588042] ? v9fs_show_options+0x690/0x690 [ 935.589030] ? trace_hardirqs_on+0x5b/0x180 [ 935.589984] ? kasan_unpoison_shadow+0x33/0x50 [ 935.590988] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 935.592125] v9fs_mount+0x79/0x8f0 [ 935.592911] ? v9fs_write_inode+0x60/0x60 [ 935.593826] legacy_get_tree+0x105/0x220 [ 935.594723] vfs_get_tree+0x8e/0x300 [ 935.595549] path_mount+0x1490/0x21e0 [ 935.596406] ? strncpy_from_user+0x9e/0x470 [ 935.597368] ? finish_automount+0xa90/0xa90 [ 935.598328] ? getname_flags.part.0+0x1dd/0x4f0 [ 935.599361] ? _copy_from_user+0xfb/0x1b0 [ 935.599509] FAULT_INJECTION: forcing a failure. [ 935.599509] name failslab, interval 1, probability 0, space 0, times 0 [ 935.600298] __x64_sys_mount+0x282/0x300 [ 935.600317] ? copy_mnt_ns+0xa00/0xa00 [ 935.600345] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 935.604682] ? syscall_enter_from_user_mode+0x1d/0x50 [ 935.605818] do_syscall_64+0x33/0x40 [ 935.606649] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 935.607793] RIP: 0033:0x7f42b2db2b19 [ 935.608612] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 935.612708] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 935.614398] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 935.616004] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 935.617594] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 935.619174] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 935.620857] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 935.622454] CPU: 1 PID: 7236 Comm: syz-executor.4 Not tainted 5.10.242 #1 [ 935.623294] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 935.624279] Call Trace: [ 935.624597] dump_stack+0x107/0x167 [ 935.625028] should_fail.cold+0x5/0xa [ 935.625486] ? create_object.isra.0+0x3a/0xa30 [ 935.626034] should_failslab+0x5/0x20 [ 935.626479] kmem_cache_alloc+0x5b/0x310 [ 935.626980] create_object.isra.0+0x3a/0xa30 [ 935.627508] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 935.628114] kmem_cache_alloc+0x159/0x310 [ 935.628629] __d_alloc+0x2a/0x990 [ 935.629045] d_alloc+0x46/0x1c0 [ 935.629449] __lookup_hash+0xcc/0x190 [ 935.629904] do_renameat2+0x498/0xbf0 [ 935.630356] ? __ia32_sys_link+0x80/0x80 [ 935.630844] ? __virt_addr_valid+0x170/0x5d0 [ 935.631378] ? __check_object_size+0x319/0x440 [ 935.631947] ? getname_flags.part.0+0x1dd/0x4f0 [ 935.632509] __x64_sys_rename+0x7d/0xa0 [ 935.633010] do_syscall_64+0x33/0x40 [ 935.633483] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 935.634092] RIP: 0033:0x7f17f2c8cb19 [ 935.634551] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 935.636748] RSP: 002b:00007f17f01e1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 935.637628] RAX: ffffffffffffffda RBX: 00007f17f2da0020 RCX: 00007f17f2c8cb19 [ 935.638477] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 935.639321] RBP: 00007f17f01e11d0 R08: 0000000000000000 R09: 0000000000000000 [ 935.640202] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 935.641043] R13: 00007ffcb391048f R14: 00007f17f01e1300 R15: 0000000000022000 01:10:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 4) 01:10:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000), &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) 01:10:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:10:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000380)=0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='mnt/encrypted_dir\x00', 0x7c6a51a5, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="8ff42940882ebce95cfcd7b37cbcdea204b4875392f984124da2844a7ccf09bbed1651b4e0e56fa920f712ed57eef4f9ea0b203d29ff6c163021994a93ccfaa77139657d29c68842dca5908bca582d112f6d3ef4ca5037f82a24b845c35d3b265f87380cb517ad23c037758fe6355588775a4a0682ee24ed6addb8fce813c9ed6b2c9fe2b40592637cb5b18f1d1ad948c93d58802a5d768763e74c6af944a9c9bba23ce966d2b02b7de12f9aab5152e774c821c43afe2c649e72b351eee530333ebf5f", 0xc3, 0xffffffff}, {&(0x7f0000000300)="65cbc00da0cf36e508afe9ee22045b6e9af9434b679e65118fc79321fcea3e32ebc030b7ce", 0x25, 0x3f}], 0x80, &(0x7f00000003c0)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x6}}, {@barrier}, {@dioread_nolock}, {@block_validity}, {@noload}, {@abort}], [{@subj_user={'subj_user', 0x3d, '[$\x9e]W%'}}, {@obj_type={'obj_type', 0x3d, '\xb5$'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@uid_eq={'uid', 0x3d, r0}}]}) chdir(&(0x7f0000000040)='./file0\x00') mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000009, 0x2010, 0xffffffffffffffff, 0x8000000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r2, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000580)=@IORING_OP_ACCEPT={0xd, 0x5, 0x0, r2, &(0x7f0000000480)=0x80, &(0x7f0000000500)=@qipcrtr, 0x0, 0x80800, 0x1}, 0x7) 01:10:22 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 3) 01:10:22 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) r1 = dup3(0xffffffffffffffff, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./file2\x00', &(0x7f0000000240), 0x1000000, &(0x7f0000000580)=ANY=[@ANYBLOB="7472616e7300001f000000000000005200e92fafc14e33754789a572a4fbb500036f3dd2d229942f545dd9adcd22f32a8679d49c66577b1ec480d89417b02259fce7ea997177ce0aeea691357028da24cfdfce24c9ed5e185327bb6e24f6faf17340a52f531323c1c8b9edb210b8f4417ceec1ead88e00b1adad2e5b5db93e9972e94bb264a00700427cb4198cd0603954b636ed7fa3822e9289bfb000e6734647daebdc00"/175, @ANYRESHEX, @ANYBLOB="2c6f8fae680000", @ANYRESHEX=r1, @ANYBLOB="2c64656275673d3078303030303030303030303030303030372c76657273696f6e3d3970323030302e4c2c63616368653d6d6d61702c76657273696f6ef7ff70323030302c736d61636b66737472616e736d7574653d2c6f626a5f747970653d7666617400743d726f6f742c66736d616769633d3078303038303030303030303030303830302c6d61736b3d5e4d41595f455845432c00"/160]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='mnt/encrypted_dir\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500), 0x80000, 0x0) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000540)) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r2, 0x0) mkdirat(r2, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r4 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r4, 0x0) io_uring_enter(r4, 0x58ab, 0x0, 0x0, 0x0, 0x0) fallocate(r4, 0x4, 0xf6, 0x3) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x14083, 0x0) symlinkat(&(0x7f0000000280)='./file0\x00', r5, &(0x7f0000000480)='mnt/encrypted_dir\x00') [ 935.788011] loop3: detected capacity change from 0 to 41948160 [ 935.810366] loop1: detected capacity change from 0 to 41948160 [ 935.820128] loop5: detected capacity change from 0 to 41948160 [ 935.889571] loop2: detected capacity change from 0 to 41948160 [ 935.894536] FAULT_INJECTION: forcing a failure. [ 935.894536] name failslab, interval 1, probability 0, space 0, times 0 [ 935.895913] CPU: 1 PID: 7247 Comm: syz-executor.1 Not tainted 5.10.242 #1 [ 935.896660] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 935.897625] Call Trace: [ 935.898018] dump_stack+0x107/0x167 [ 935.898536] should_fail.cold+0x5/0xa [ 935.899086] ? getname_flags.part.0+0x50/0x4f0 [ 935.899715] should_failslab+0x5/0x20 [ 935.900263] kmem_cache_alloc+0x5b/0x310 [ 935.900834] ? strncpy_from_user+0x9e/0x470 [ 935.901447] getname_flags.part.0+0x50/0x4f0 [ 935.902082] getname_flags+0x9a/0xe0 [ 935.902599] __x64_sys_rename+0x65/0xa0 [ 935.903144] do_syscall_64+0x33/0x40 [ 935.903668] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 935.903808] FAULT_INJECTION: forcing a failure. [ 935.903808] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 935.904364] RIP: 0033:0x7f0d8d27eb19 [ 935.904384] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 935.909520] RSP: 002b:00007f0d8a7f4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 935.910402] RAX: ffffffffffffffda RBX: 00007f0d8d391f60 RCX: 00007f0d8d27eb19 [ 935.911222] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 935.912061] RBP: 00007f0d8a7f41d0 R08: 0000000000000000 R09: 0000000000000000 [ 935.912902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 935.913731] R13: 00007fffd1f2f40f R14: 00007f0d8a7f4300 R15: 0000000000022000 [ 935.914582] CPU: 0 PID: 7254 Comm: syz-executor.2 Not tainted 5.10.242 #1 [ 935.916146] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 935.918009] Call Trace: [ 935.918617] dump_stack+0x107/0x167 [ 935.919433] should_fail.cold+0x5/0xa [ 935.920313] strncpy_from_user+0x34/0x470 [ 935.921257] getname_flags.part.0+0x95/0x4f0 [ 935.922244] getname_flags+0x9a/0xe0 [ 935.923236] __x64_sys_rename+0x56/0xa0 [ 935.924155] do_syscall_64+0x33/0x40 [ 935.925150] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 935.926294] RIP: 0033:0x7f26c16eeb19 [ 935.927134] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 935.931252] RSP: 002b:00007f26bec64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 935.932969] RAX: ffffffffffffffda RBX: 00007f26c1801f60 RCX: 00007f26c16eeb19 [ 935.934571] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 935.936176] RBP: 00007f26bec641d0 R08: 0000000000000000 R09: 0000000000000000 [ 935.937778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 935.939380] R13: 00007ffe1c79efff R14: 00007f26bec64300 R15: 0000000000022000 01:10:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 5) 01:10:37 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 30) 01:10:37 executing program 7: kexec_load(0x3, 0x2, &(0x7f0000000300)=[{&(0x7f0000000200)}, {0x0, 0x0, 0x0, 0x4}], 0x0) kexec_load(0xff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="3f2dbceeee8b7e59c717f52edc78b151c9a9811adeb2f9f76d4773c632697b66b32d0f9a9f", 0x25, 0x4}], 0x140000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_RM_DEV(0xffffffffffffffff, 0x5000940b, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000001780)={{0x2, 0x0, @remote}, {}, 0x0, {0x2, 0x0, @broadcast}}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x81, 0x0, 0x0, 0x60000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) creat(0x0, 0x0) 01:10:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x5, &(0x7f00000002c0)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}, {&(0x7f0000000080)="5782c8cf7093ea0d9c89f3076bed6d5ba288c8b4a8131e", 0x17, 0x4}, {&(0x7f0000000200), 0x0, 0x381}, {&(0x7f0000000240)="cf0cdc3546621ea7e22692907fa42e9986d4c90316cf421f1faae9be75d5957c9cf3f287dd1d0ba205425c6cd49ef23221f97a1fd1ba31807764c8a3e73c97a02bee6f07385aad395f5228fba424843fe152a16e3e6f05dbf92a0bf12471b0f21e", 0x61, 0x5}], 0x2800018, &(0x7f0000000080)=ANY=[]) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir\x00', &(0x7f0000000340), 0x2000, &(0x7f0000000380)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}, {@msize={'msize', 0x3d, 0x64}}, {@dfltuid={'dfltuid', 0x3d, r0}}, {@cache_mmap}, {@loose}, {@access_client}, {@cache_fscache}], [{@smackfsfloor={'smackfsfloor', 0x3d, ','}}, {@subj_role={'subj_role', 0x3d, '{//([+\'$-%-'}}, {@dont_appraise}]}}) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:10:37 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) open(&(0x7f0000000100)='./file1/file0\x00', 0x480000, 0x4) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file1\x00', 0x0, 0xfffffee6, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:10:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 10) 01:10:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x100000000, 0x0, 0x0, 0x2008000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:10:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 4) [ 950.865910] loop1: detected capacity change from 0 to 41948160 [ 950.880881] loop2: detected capacity change from 0 to 41948160 [ 950.891324] FAULT_INJECTION: forcing a failure. [ 950.891324] name failslab, interval 1, probability 0, space 0, times 0 [ 950.892807] CPU: 0 PID: 7267 Comm: syz-executor.2 Not tainted 5.10.242 #1 [ 950.893654] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 950.894692] Call Trace: [ 950.895028] dump_stack+0x107/0x167 [ 950.895486] should_fail.cold+0x5/0xa [ 950.895979] ? getname_flags.part.0+0x50/0x4f0 [ 950.896549] should_failslab+0x5/0x20 [ 950.897025] kmem_cache_alloc+0x5b/0x310 [ 950.897538] ? strncpy_from_user+0x9e/0x470 [ 950.897684] loop5: detected capacity change from 0 to 41948160 [ 950.898068] getname_flags.part.0+0x50/0x4f0 [ 950.898081] getname_flags+0x9a/0xe0 [ 950.898101] __x64_sys_rename+0x65/0xa0 [ 950.900575] do_syscall_64+0x33/0x40 [ 950.901054] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 950.901706] RIP: 0033:0x7f26c16eeb19 [ 950.902182] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 950.903205] FAT-fs (loop5): Unrecognized mount option "W‚ÈÏp“꜉ókím[¢ˆÈ´¨" or missing value [ 950.904472] RSP: 002b:00007f26bec64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 950.904484] RAX: ffffffffffffffda RBX: 00007f26c1801f60 RCX: 00007f26c16eeb19 [ 950.904489] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 950.904495] RBP: 00007f26bec641d0 R08: 0000000000000000 R09: 0000000000000000 [ 950.904501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 950.904507] R13: 00007ffe1c79efff R14: 00007f26bec64300 R15: 0000000000022000 [ 950.918464] FAULT_INJECTION: forcing a failure. [ 950.918464] name failslab, interval 1, probability 0, space 0, times 0 [ 950.918724] FAULT_INJECTION: forcing a failure. [ 950.918724] name failslab, interval 1, probability 0, space 0, times 0 [ 950.919904] CPU: 0 PID: 7263 Comm: syz-executor.1 Not tainted 5.10.242 #1 [ 950.922317] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 950.923350] Call Trace: [ 950.923676] dump_stack+0x107/0x167 [ 950.924142] should_fail.cold+0x5/0xa [ 950.924622] ? create_object.isra.0+0x3a/0xa30 [ 950.925187] should_failslab+0x5/0x20 [ 950.925656] kmem_cache_alloc+0x5b/0x310 [ 950.926166] create_object.isra.0+0x3a/0xa30 [ 950.926705] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 950.927321] kmem_cache_alloc+0x159/0x310 [ 950.927817] ? strncpy_from_user+0x9e/0x470 [ 950.928352] getname_flags.part.0+0x50/0x4f0 [ 950.928882] getname_flags+0x9a/0xe0 [ 950.929333] __x64_sys_rename+0x65/0xa0 [ 950.929811] do_syscall_64+0x33/0x40 [ 950.930291] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 950.930932] RIP: 0033:0x7f0d8d27eb19 [ 950.931388] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 950.933663] RSP: 002b:00007f0d8a7f4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 950.934590] RAX: ffffffffffffffda RBX: 00007f0d8d391f60 RCX: 00007f0d8d27eb19 [ 950.935460] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 950.936335] RBP: 00007f0d8a7f41d0 R08: 0000000000000000 R09: 0000000000000000 [ 950.937192] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 950.938065] R13: 00007fffd1f2f40f R14: 00007f0d8a7f4300 R15: 0000000000022000 [ 950.938966] CPU: 1 PID: 7274 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 950.939982] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 950.941172] Call Trace: [ 950.941562] dump_stack+0x107/0x167 [ 950.942078] should_fail.cold+0x5/0xa [ 950.942620] should_failslab+0x5/0x20 [ 950.943121] __kmalloc_track_caller+0x79/0x370 [ 950.943766] ? match_number+0xaf/0x1d0 [ 950.944490] ? kfree+0xd7/0x340 [ 950.945056] kmemdup_nul+0x2d/0xa0 [ 950.945582] match_number+0xaf/0x1d0 [ 950.946108] ? match_u64+0x190/0x190 [ 950.946620] ? __kmalloc_track_caller+0x2c6/0x370 [ 950.947325] ? memcpy+0x39/0x60 [ 950.947792] parse_opts.part.0+0x1f3/0x340 [ 950.948410] ? p9_fd_show_options+0x1c0/0x1c0 [ 950.949044] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 950.949791] ? trace_hardirqs_on+0x5b/0x180 [ 950.950394] ? kfree+0xd7/0x340 [ 950.950859] p9_fd_create+0x98/0x4a0 [ 950.951396] ? p9_conn_create+0x510/0x510 [ 950.951989] ? p9_client_create+0x798/0x1230 [ 950.952608] ? kfree+0xd7/0x340 [ 950.953053] ? do_raw_spin_unlock+0x4f/0x220 [ 950.953664] p9_client_create+0x7ff/0x1230 [ 950.954262] ? p9_client_flush+0x430/0x430 [ 950.954836] ? trace_hardirqs_on+0x5b/0x180 [ 950.955440] ? lockdep_init_map_type+0x2c7/0x780 [ 950.956101] ? __raw_spin_lock_init+0x36/0x110 [ 950.956738] v9fs_session_init+0x1dd/0x1680 [ 950.957335] ? lock_release+0x680/0x680 [ 950.957885] ? kmem_cache_alloc_trace+0x151/0x320 [ 950.958552] ? v9fs_show_options+0x690/0x690 [ 950.959156] ? trace_hardirqs_on+0x5b/0x180 [ 950.959762] ? kasan_unpoison_shadow+0x33/0x50 [ 950.960421] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 950.961136] v9fs_mount+0x79/0x8f0 [ 950.961650] ? v9fs_write_inode+0x60/0x60 [ 950.962245] legacy_get_tree+0x105/0x220 [ 950.962810] vfs_get_tree+0x8e/0x300 [ 950.963345] path_mount+0x1490/0x21e0 [ 950.963878] ? strncpy_from_user+0x9e/0x470 [ 950.964491] ? finish_automount+0xa90/0xa90 [ 950.965085] ? getname_flags.part.0+0x1dd/0x4f0 [ 950.965742] ? _copy_from_user+0xfb/0x1b0 [ 950.966334] __x64_sys_mount+0x282/0x300 [ 950.966892] ? copy_mnt_ns+0xa00/0xa00 [ 950.967455] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 950.968207] ? syscall_enter_from_user_mode+0x1d/0x50 [ 950.968931] do_syscall_64+0x33/0x40 [ 950.969458] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 950.970161] RIP: 0033:0x7f42b2db2b19 [ 950.970667] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 950.973228] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 950.974305] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 950.975402] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 950.976421] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 950.977430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 950.978436] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 950.981051] 9pnet: Insufficient options for proto=fd [ 950.984687] loop6: detected capacity change from 0 to 41948160 01:10:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 6) 01:10:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 5) [ 950.996352] FAULT_INJECTION: forcing a failure. [ 950.996352] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 950.998001] CPU: 1 PID: 7287 Comm: syz-executor.4 Not tainted 5.10.242 #1 01:10:37 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000380)=0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='mnt/encrypted_dir\x00', 0x7c6a51a5, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="8ff42940882ebce95cfcd7b37cbcdea204b4875392f984124da2844a7ccf09bbed1651b4e0e56fa920f712ed57eef4f9ea0b203d29ff6c163021994a93ccfaa77139657d29c68842dca5908bca582d112f6d3ef4ca5037f82a24b845c35d3b265f87380cb517ad23c037758fe6355588775a4a0682ee24ed6addb8fce813c9ed6b2c9fe2b40592637cb5b18f1d1ad948c93d58802a5d768763e74c6af944a9c9bba23ce966d2b02b7de12f9aab5152e774c821c43afe2c649e72b351eee530333ebf5f", 0xc3, 0xffffffff}, {&(0x7f0000000300)="65cbc00da0cf36e508afe9ee22045b6e9af9434b679e65118fc79321fcea3e32ebc030b7ce", 0x25, 0x3f}], 0x80, &(0x7f00000003c0)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x6}}, {@barrier}, {@dioread_nolock}, {@block_validity}, {@noload}, {@abort}], [{@subj_user={'subj_user', 0x3d, '[$\x9e]W%'}}, {@obj_type={'obj_type', 0x3d, '\xb5$'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@uid_eq={'uid', 0x3d, r0}}]}) chdir(&(0x7f0000000040)='./file0\x00') mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000009, 0x2010, 0xffffffffffffffff, 0x8000000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r2, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000580)=@IORING_OP_ACCEPT={0xd, 0x5, 0x0, r2, &(0x7f0000000480)=0x80, &(0x7f0000000500)=@qipcrtr, 0x0, 0x80800, 0x1}, 0x7) [ 950.998950] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 951.000212] Call Trace: [ 951.000584] dump_stack+0x107/0x167 [ 951.001069] should_fail.cold+0x5/0xa [ 951.001624] _copy_from_user+0x2e/0x1b0 [ 951.002166] kstrtouint_from_user+0xbd/0x220 [ 951.002783] ? kstrtou8_from_user+0x210/0x210 [ 951.003414] ? lock_acquire+0x197/0x470 [ 951.003962] ? ksys_write+0x12d/0x260 [ 951.004502] proc_fail_nth_write+0x78/0x220 [ 951.005098] ? proc_task_getattr+0x1f0/0x1f0 [ 951.005729] ? proc_task_getattr+0x1f0/0x1f0 [ 951.006355] vfs_write+0x29a/0xb10 [ 951.006852] ksys_write+0x12d/0x260 [ 951.007380] ? __ia32_sys_read+0xb0/0xb0 [ 951.007957] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 951.008677] ? syscall_enter_from_user_mode+0x1d/0x50 [ 951.009391] do_syscall_64+0x33/0x40 [ 951.009902] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 951.010604] RIP: 0033:0x7f17f2c3f5ff [ 951.011128] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 951.013662] RSP: 002b:00007f17f01e1170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 951.014712] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f17f2c3f5ff [ 951.015688] RDX: 0000000000000001 RSI: 00007f17f01e11e0 RDI: 0000000000000005 [ 951.016668] RBP: 00007f17f01e11d0 R08: 0000000000000000 R09: 0000000000000000 [ 951.017653] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 951.018582] R13: 00007ffcb391048f R14: 00007f17f01e1300 R15: 0000000000022000 [ 951.031243] loop4: detected capacity change from 0 to 41948160 [ 951.035687] loop3: detected capacity change from 0 to 41948160 01:10:38 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 31) [ 951.060394] FAT-fs (loop3): Unrecognized mount option "mnt/encrypted_dir" or missing value [ 951.071036] loop5: detected capacity change from 0 to 41948160 01:10:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 951.087400] FAT-fs (loop5): Unrecognized mount option "W‚ÈÏp“꜉ókím[¢ˆÈ´¨" or missing value [ 951.098191] FAULT_INJECTION: forcing a failure. [ 951.098191] name failslab, interval 1, probability 0, space 0, times 0 [ 951.099998] CPU: 1 PID: 7300 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 951.100911] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 951.102038] Call Trace: [ 951.102424] dump_stack+0x107/0x167 01:10:38 executing program 7: r0 = shmget$private(0x0, 0x13000, 0x0, &(0x7f0000fed000/0x13000)=nil) r1 = shmat(r0, &(0x7f0000ff0000/0x10000)=nil, 0xd000) shmdt(r1) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0x2000) shmdt(r1) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002800000000000028252f4500000000000000000000000000000000000000000000000000000000000100000101e700010008", 0x82, 0x8800}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='itcharjet=k']) [ 951.102914] should_fail.cold+0x5/0xa [ 951.103829] ? create_object.isra.0+0x3a/0xa30 [ 951.104867] should_failslab+0x5/0x20 [ 951.105717] kmem_cache_alloc+0x5b/0x310 [ 951.106628] create_object.isra.0+0x3a/0xa30 [ 951.107599] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 951.108756] __kmalloc_track_caller+0x177/0x370 [ 951.109775] ? match_number+0xaf/0x1d0 [ 951.110615] kmemdup_nul+0x2d/0xa0 [ 951.111392] match_number+0xaf/0x1d0 [ 951.112214] ? match_u64+0x190/0x190 [ 951.113025] ? __kmalloc_track_caller+0x2c6/0x370 [ 951.114112] ? memcpy+0x39/0x60 [ 951.114845] parse_opts.part.0+0x1f3/0x340 [ 951.115779] ? p9_fd_show_options+0x1c0/0x1c0 [ 951.116782] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 951.117923] ? trace_hardirqs_on+0x5b/0x180 [ 951.118847] ? kfree+0xd7/0x340 [ 951.119572] p9_fd_create+0x98/0x4a0 [ 951.120416] ? p9_conn_create+0x510/0x510 [ 951.121344] ? p9_client_create+0x798/0x1230 [ 951.122287] ? kfree+0xd7/0x340 [ 951.123027] ? do_raw_spin_unlock+0x4f/0x220 [ 951.124014] p9_client_create+0x7ff/0x1230 [ 951.124956] ? p9_client_flush+0x430/0x430 [ 951.125893] ? trace_hardirqs_on+0x5b/0x180 [ 951.126863] ? lockdep_init_map_type+0x2c7/0x780 [ 951.127962] ? __raw_spin_lock_init+0x36/0x110 [ 951.128978] v9fs_session_init+0x1dd/0x1680 [ 951.129898] ? lock_release+0x680/0x680 [ 951.130761] ? kmem_cache_alloc_trace+0x151/0x320 [ 951.131796] ? v9fs_show_options+0x690/0x690 [ 951.132762] ? trace_hardirqs_on+0x5b/0x180 [ 951.133687] ? kasan_unpoison_shadow+0x33/0x50 [ 951.134661] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 951.135724] v9fs_mount+0x79/0x8f0 [ 951.136480] ? v9fs_write_inode+0x60/0x60 [ 951.137345] legacy_get_tree+0x105/0x220 [ 951.138192] vfs_get_tree+0x8e/0x300 [ 951.138984] path_mount+0x1490/0x21e0 [ 951.139788] ? strncpy_from_user+0x9e/0x470 [ 951.140697] ? finish_automount+0xa90/0xa90 [ 951.141601] ? getname_flags.part.0+0x1dd/0x4f0 [ 951.142578] ? _copy_from_user+0xfb/0x1b0 [ 951.143454] __x64_sys_mount+0x282/0x300 [ 951.144310] ? copy_mnt_ns+0xa00/0xa00 [ 951.145150] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 951.146256] ? syscall_enter_from_user_mode+0x1d/0x50 [ 951.147340] do_syscall_64+0x33/0x40 [ 951.148131] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 951.149231] RIP: 0033:0x7f42b2db2b19 [ 951.150019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 951.153946] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 951.155550] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 951.157085] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 951.158584] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 951.160074] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 951.161562] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 951.182260] FAULT_INJECTION: forcing a failure. [ 951.182260] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 951.184769] CPU: 1 PID: 7308 Comm: syz-executor.1 Not tainted 5.10.242 #1 [ 951.186240] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 951.187991] Call Trace: [ 951.188552] dump_stack+0x107/0x167 [ 951.189316] should_fail.cold+0x5/0xa [ 951.190130] strncpy_from_user+0x34/0x470 [ 951.191010] getname_flags.part.0+0x95/0x4f0 [ 951.191968] getname_flags+0x9a/0xe0 [ 951.192766] __x64_sys_rename+0x65/0xa0 [ 951.193615] do_syscall_64+0x33/0x40 [ 951.194403] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 951.195486] RIP: 0033:0x7f0d8d27eb19 [ 951.196285] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 951.200178] RSP: 002b:00007f0d8a7d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 951.201790] RAX: ffffffffffffffda RBX: 00007f0d8d392020 RCX: 00007f0d8d27eb19 [ 951.203300] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 951.204807] RBP: 00007f0d8a7d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 951.206320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 951.207820] R13: 00007fffd1f2f40f R14: 00007f0d8a7d3300 R15: 0000000000022000 [ 951.218372] FAULT_INJECTION: forcing a failure. [ 951.218372] name failslab, interval 1, probability 0, space 0, times 0 [ 951.220768] CPU: 1 PID: 7296 Comm: syz-executor.2 Not tainted 5.10.242 #1 [ 951.222227] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 951.224001] Call Trace: [ 951.224564] dump_stack+0x107/0x167 [ 951.225338] should_fail.cold+0x5/0xa [ 951.226149] ? create_object.isra.0+0x3a/0xa30 [ 951.227132] should_failslab+0x5/0x20 [ 951.227946] kmem_cache_alloc+0x5b/0x310 [ 951.228808] create_object.isra.0+0x3a/0xa30 [ 951.229749] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 951.230835] kmem_cache_alloc+0x159/0x310 [ 951.231707] ? strncpy_from_user+0x9e/0x470 [ 951.232634] getname_flags.part.0+0x50/0x4f0 [ 951.233562] getname_flags+0x9a/0xe0 [ 951.234353] __x64_sys_rename+0x65/0xa0 [ 951.235193] do_syscall_64+0x33/0x40 [ 951.235990] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 951.237075] RIP: 0033:0x7f26c16eeb19 [ 951.237871] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 951.241786] RSP: 002b:00007f26bec64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 951.243406] RAX: ffffffffffffffda RBX: 00007f26c1801f60 RCX: 00007f26c16eeb19 [ 951.244920] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 951.246423] RBP: 00007f26bec641d0 R08: 0000000000000000 R09: 0000000000000000 [ 951.247944] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 951.249445] R13: 00007ffe1c79efff R14: 00007f26bec64300 R15: 0000000000022000 01:10:38 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 32) [ 951.263224] loop3: detected capacity change from 0 to 41948160 [ 951.267948] FAT-fs (loop3): Unrecognized mount option "mnt/encrypted_dir" or missing value [ 951.296765] FAULT_INJECTION: forcing a failure. [ 951.296765] name failslab, interval 1, probability 0, space 0, times 0 [ 951.298216] CPU: 0 PID: 7316 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 951.299049] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 951.300068] Call Trace: [ 951.300392] dump_stack+0x107/0x167 [ 951.300846] should_fail.cold+0x5/0xa [ 951.301327] ? p9_fd_create+0x161/0x4a0 [ 951.301820] should_failslab+0x5/0x20 [ 951.302291] kmem_cache_alloc_trace+0x55/0x320 [ 951.302847] p9_fd_create+0x161/0x4a0 [ 951.303314] ? p9_conn_create+0x510/0x510 [ 951.303837] ? p9_client_create+0x798/0x1230 [ 951.304391] ? kfree+0xd7/0x340 [ 951.304790] ? do_raw_spin_unlock+0x4f/0x220 [ 951.305327] p9_client_create+0x7ff/0x1230 [ 951.305849] ? p9_client_flush+0x430/0x430 [ 951.306362] ? trace_hardirqs_on+0x5b/0x180 [ 951.306892] ? lockdep_init_map_type+0x2c7/0x780 [ 951.307464] ? __raw_spin_lock_init+0x36/0x110 [ 951.308033] v9fs_session_init+0x1dd/0x1680 [ 951.308552] ? lock_release+0x680/0x680 [ 951.309038] ? kmem_cache_alloc_trace+0x151/0x320 [ 951.309618] ? v9fs_show_options+0x690/0x690 [ 951.310188] ? trace_hardirqs_on+0x5b/0x180 [ 951.310709] ? kasan_unpoison_shadow+0x33/0x50 [ 951.311262] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 951.311890] v9fs_mount+0x79/0x8f0 [ 951.312329] ? v9fs_write_inode+0x60/0x60 [ 951.312842] legacy_get_tree+0x105/0x220 [ 951.313335] vfs_get_tree+0x8e/0x300 [ 951.313790] path_mount+0x1490/0x21e0 [ 951.314263] ? strncpy_from_user+0x9e/0x470 [ 951.314790] ? finish_automount+0xa90/0xa90 [ 951.315310] ? getname_flags.part.0+0x1dd/0x4f0 [ 951.315875] ? _copy_from_user+0xfb/0x1b0 [ 951.316390] __x64_sys_mount+0x282/0x300 [ 951.316880] ? copy_mnt_ns+0xa00/0xa00 [ 951.317401] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 951.318045] ? syscall_enter_from_user_mode+0x1d/0x50 [ 951.318678] do_syscall_64+0x33/0x40 [ 951.319128] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 951.319747] RIP: 0033:0x7f42b2db2b19 [ 951.320206] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 951.322425] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 951.323355] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 951.324238] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 951.325096] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 951.325965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 951.326826] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 951.327986] loop4: detected capacity change from 0 to 41948160 01:10:38 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x100) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:10:38 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000440), 0x400000, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1, {0x5}}, '.\x00'}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f0000000200)=@v1={0x0, @adiantum, 0x0, @desc3}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000240)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000640)) rename(&(0x7f00000005c0)='mnt/encrypted_dir\x00', &(0x7f0000000600)='mnt/encrypted_dir\x00') syz_io_uring_setup(0x4b4c, &(0x7f0000000500)={0x0, 0xbda1, 0x0, 0x0, 0x65, 0x0, r1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000580)) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:10:38 executing program 7: ftruncate(0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file1\x00', 0x101000, 0x0) statx(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x3}, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x69) io_setup(0x3, &(0x7f0000000000)=0x0) r2 = inotify_init1(0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x43) dup3(r3, r2, 0x0) io_cancel(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6, 0x427, r2, &(0x7f0000000080)="9b092f6d4da7d173fbc970301e3efff493a04ced5782a5cd6755bbcc95af47e62284", 0x22, 0x100000000}, &(0x7f0000000180)) r4 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) io_submit(r1, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x3000000}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000240)={'sit0\x00', 0x0, 0x2f, 0x2, 0x6a, 0x101, 0x10, @private1={0xfc, 0x1, '\x00', 0x1}, @private2, 0x20, 0x0, 0x61, 0x6}}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) [ 951.372563] loop5: detected capacity change from 0 to 41948160 [ 951.403286] loop6: detected capacity change from 0 to 41948160 [ 965.341775] loop1: detected capacity change from 0 to 41948160 [ 965.348261] FAULT_INJECTION: forcing a failure. [ 965.348261] name failslab, interval 1, probability 0, space 0, times 0 [ 965.350779] CPU: 1 PID: 7341 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 965.352222] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 965.353957] Call Trace: [ 965.354517] dump_stack+0x107/0x167 [ 965.355287] should_fail.cold+0x5/0xa [ 965.356112] ? create_object.isra.0+0x3a/0xa30 [ 965.357075] should_failslab+0x5/0x20 [ 965.357865] kmem_cache_alloc+0x5b/0x310 [ 965.358724] ? p9_fd_show_options+0x1c0/0x1c0 [ 965.359677] create_object.isra.0+0x3a/0xa30 [ 965.360610] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 965.361677] kmem_cache_alloc_trace+0x151/0x320 [ 965.362657] p9_fd_create+0x161/0x4a0 [ 965.363462] ? p9_conn_create+0x510/0x510 [ 965.364340] ? p9_client_create+0x798/0x1230 [ 965.365266] ? kfree+0xd7/0x340 [ 965.365958] ? do_raw_spin_unlock+0x4f/0x220 [ 965.366891] p9_client_create+0x7ff/0x1230 [ 965.367784] ? p9_client_flush+0x430/0x430 [ 965.368692] ? trace_hardirqs_on+0x5b/0x180 [ 965.369612] ? lockdep_init_map_type+0x2c7/0x780 [ 965.370611] ? __raw_spin_lock_init+0x36/0x110 [ 965.371573] v9fs_session_init+0x1dd/0x1680 [ 965.372490] ? lock_release+0x680/0x680 [ 965.373327] ? kmem_cache_alloc_trace+0x151/0x320 [ 965.374337] ? v9fs_show_options+0x690/0x690 [ 965.375275] ? trace_hardirqs_on+0x5b/0x180 [ 965.376182] ? kasan_unpoison_shadow+0x33/0x50 [ 965.377144] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 965.378209] v9fs_mount+0x79/0x8f0 [ 965.378960] ? v9fs_write_inode+0x60/0x60 [ 965.379825] legacy_get_tree+0x105/0x220 [ 965.380685] vfs_get_tree+0x8e/0x300 [ 965.381467] path_mount+0x1490/0x21e0 01:10:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 6) [ 965.382295] ? strncpy_from_user+0x9e/0x470 [ 965.383468] ? finish_automount+0xa90/0xa90 [ 965.384393] ? getname_flags.part.0+0x1dd/0x4f0 [ 965.385366] ? _copy_from_user+0xfb/0x1b0 [ 965.386237] __x64_sys_mount+0x282/0x300 01:10:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d7466732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x10010007fd}], 0x80, &(0x7f0000000200)=ANY=[@ANYBLOB="a3da4bbc58156d14c34a23dbc2a9f361d11cdfd9c1ad59cfa11127c8f5a57a0f9d3f7d9ff8e9455a2dd5ee8c79c6de3d993e3a85db4bd3c1cf586948594bd1c6838c87152e8b0f4ea068100bd6570e908c92e3ee8261810d31100ad7f0af3f2dcd42d17336a3ea904c11ce39963b837c1110f03ddfc5054a"]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:10:52 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 33) 01:10:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:10:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 7) 01:10:52 executing program 7: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="78bf330ede5ce51e0bc4b8e020c48e8cd74fc76b076cfc44bb0d67dc31b59997075fd96163d8cc54bfddcd63d4cca84336220c3744aa37d98f089166df838751fe644b6871753cf0b3827c16ae2b78eb9257851af80cdb7b781d4c2ce2", 0x5d, 0x20008000, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x2, 0x0, 0xfc, 0x0, 0x0, 0x8004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:10:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000000)='mnt/encrypted_dir/file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f00000001c0)='mnt/encrypted_dir\x00', &(0x7f0000000040)='./file0\x00') 01:10:52 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) fsetxattr$security_selinux(r0, &(0x7f00000006c0), &(0x7f0000000700)='system_u:object_r:dmidecode_exec_t:s0\x00', 0x26, 0x1) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000240)='\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000280)="4110e8e1ee1b8ea07755f885fb314843a59d1fc1ef59eebec6183ba7e6ef86f829bb9b4f637f41e41f10e486c574b91891b610f911ee580f3ac801bb244e732d43f4383dae6f3d720bee7b39fd3b51a97dfaac478fa8fa44ca4a370f1a2e86eaef4ff027f29434f3de611da3e32d77bb0e77856304e17fde63", 0x79, 0x6}, {&(0x7f0000000300)="c7b9c205a2618cdc3511ceff1c6ded0d5a854b097f452ab1fb9cd19f1d439a9cc13db179dea1611a08ab709cabeb71c9d286afaa7261f8e0b99e7dfa2b9d625f71e3102a89bc298e6f431ac9bfe4edfaf9fec70d01e37d8b17471611ff940a094f48fe5bb5651c91decb2a7a1683a7352ab7", 0x72, 0x1}, {&(0x7f0000000380)="d779b3805cb3f79214a1d5d8121c73cb093dc317a3249fe2f0a82590ba0caca49dcc7c6939d37a45ea97e744cea174c45ebca739e438fe4b071ec80a44f8e207c3c1a43a1f8838e1864a55f217202ae2645c310f812720fa66e862c32844d9d9626a9afe7e14e6c02e1d0643779393b6421941fdc0c0bc5a172914f7d26259bccc", 0x81, 0x1}, {&(0x7f0000000440)="76d74486ae3277b5273b5eb1c3aa85901a318c22549623c4deb710ae6afb1c7024977ff7d85f29f72f06dfdc0d860cf01619392ba496bdc4fd6c0c25c68009742e4df58f8b6a784f7ee09fe4a93a5cc0baaf945fcbcdc0a123756b309a2ffe400bebf2ea4f699dac55215f35935c5ae087", 0x71, 0x4000101}], 0x39c014, &(0x7f0000000640)={[{@numtail}, {@shortname_winnt}, {@shortname_win95}], [{@fowner_gt={'fowner>', r1}}, {@subj_role={'subj_role', 0x3d, 'vfat\x00'}}]}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 965.387253] ? copy_mnt_ns+0xa00/0xa00 [ 965.388316] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 965.389414] ? syscall_enter_from_user_mode+0x1d/0x50 [ 965.390501] do_syscall_64+0x33/0x40 [ 965.391282] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 965.392361] RIP: 0033:0x7f42b2db2b19 [ 965.393136] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 965.396997] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 965.398586] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 965.400086] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 965.401576] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 965.403066] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 965.404568] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 965.415961] loop5: detected capacity change from 0 to 41946624 [ 965.423022] loop2: detected capacity change from 0 to 41948160 01:10:52 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x2) ftruncate(r0, 0x1000003) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netlink\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = dup2(r1, r1) write$binfmt_elf64(r3, &(0x7f0000000980)=ANY=[], 0x3c7) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x266d40) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000040)=[r2, r3, r1, r4, 0xffffffffffffffff, r5, r1], 0x7) fcntl$addseals(r2, 0x409, 0x8) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0x40345410, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x39, 0x1, 0x8}}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) close(r1) lseek(r6, 0x0, 0x2) r7 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x0) copy_file_range(r7, 0x0, r6, 0x0, 0x200f5ef, 0x0) [ 965.433136] loop3: detected capacity change from 0 to 41948160 [ 965.439671] loop4: detected capacity change from 0 to 41948160 [ 965.448963] loop6: detected capacity change from 0 to 41948160 [ 965.454439] FAT-fs (loop5): Unrecognized mount option "£ÚK¼XmÃJ#Û©óaÑßÙÁ­YÏ¡'Èõ¥z?}ŸøéEZ-ÕîŒyÆÞ=™>:…ÛKÓÁÏXiHYKÑÆƒŒ‡.‹N h ÖWŒ’ãî‚a1 [ 965.454439] ×ð¯?-ÍBÑs6£êLÎ9–;ƒ|ð=ßÅJ" or missing value [ 965.480440] FAULT_INJECTION: forcing a failure. [ 965.480440] name failslab, interval 1, probability 0, space 0, times 0 [ 965.483077] CPU: 0 PID: 7342 Comm: syz-executor.1 Not tainted 5.10.242 #1 [ 965.484631] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 965.486495] Call Trace: [ 965.487095] dump_stack+0x107/0x167 [ 965.487918] should_fail.cold+0x5/0xa [ 965.488789] ? __d_alloc+0x2a/0x990 [ 965.489614] should_failslab+0x5/0x20 [ 965.490480] kmem_cache_alloc+0x5b/0x310 [ 965.491387] ? __d_lookup+0x3bf/0x760 [ 965.492267] __d_alloc+0x2a/0x990 [ 965.493055] d_alloc+0x46/0x1c0 [ 965.493803] __lookup_hash+0xcc/0x190 [ 965.494680] do_renameat2+0x51f/0xbf0 [ 965.495546] ? __ia32_sys_link+0x80/0x80 [ 965.496483] ? __virt_addr_valid+0x170/0x5d0 [ 965.497477] ? __check_object_size+0x319/0x440 [ 965.498516] ? getname_flags.part.0+0x1dd/0x4f0 [ 965.499574] __x64_sys_rename+0x7d/0xa0 [ 965.500489] do_syscall_64+0x33/0x40 [ 965.501325] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 965.502476] RIP: 0033:0x7f0d8d27eb19 [ 965.503316] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 965.507333] RSP: 002b:00007f0d8a7f4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 965.509068] RAX: ffffffffffffffda RBX: 00007f0d8d391f60 RCX: 00007f0d8d27eb19 [ 965.510683] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 965.512305] RBP: 00007f0d8a7f41d0 R08: 0000000000000000 R09: 0000000000000000 [ 965.513915] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 965.515530] R13: 00007fffd1f2f40f R14: 00007f0d8a7f4300 R15: 0000000000022000 01:10:52 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 34) [ 965.530268] FAULT_INJECTION: forcing a failure. [ 965.530268] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 965.532800] CPU: 1 PID: 7353 Comm: syz-executor.2 Not tainted 5.10.242 #1 [ 965.534227] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 965.535969] Call Trace: [ 965.536535] dump_stack+0x107/0x167 [ 965.537316] should_fail.cold+0x5/0xa [ 965.538122] strncpy_from_user+0x34/0x470 [ 965.538999] getname_flags.part.0+0x95/0x4f0 [ 965.540010] getname_flags+0x9a/0xe0 [ 965.540810] __x64_sys_rename+0x65/0xa0 [ 965.541733] do_syscall_64+0x33/0x40 [ 965.542596] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 965.543664] RIP: 0033:0x7f26c16eeb19 [ 965.544473] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 965.548348] RSP: 002b:00007f26bec64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 965.549959] RAX: ffffffffffffffda RBX: 00007f26c1801f60 RCX: 00007f26c16eeb19 [ 965.551468] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 965.552988] RBP: 00007f26bec641d0 R08: 0000000000000000 R09: 0000000000000000 [ 965.554501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 965.556015] R13: 00007ffe1c79efff R14: 00007f26bec64300 R15: 0000000000022000 [ 965.580906] loop5: detected capacity change from 0 to 41946624 [ 965.601213] loop4: detected capacity change from 0 to 109632512 [ 965.605684] FAT-fs (loop5): Unrecognized mount option "£ÚK¼XmÃJ#Û©óaÑßÙÁ­YÏ¡'Èõ¥z?}ŸøéEZ-ÕîŒyÆÞ=™>:…ÛKÓÁÏXiHYKÑÆƒŒ‡.‹N h ÖWŒ’ãî‚a1 [ 965.605684] ×ð¯?-ÍBÑs6£êLÎ9–;ƒ|ð=ßÅJ" or missing value 01:10:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 8) 01:10:52 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') unlinkat(r0, &(0x7f0000000200)='./mnt\x00', 0x200) creat(&(0x7f0000000000)='./file0\x00', 0x1) pipe(&(0x7f0000000240)={0xffffffffffffffff}) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000280)=""/92) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) [ 965.682241] FAULT_INJECTION: forcing a failure. [ 965.682241] name failslab, interval 1, probability 0, space 0, times 0 [ 965.684899] CPU: 0 PID: 7377 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 965.686449] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 965.688330] Call Trace: [ 965.688928] dump_stack+0x107/0x167 [ 965.689752] should_fail.cold+0x5/0xa [ 965.690613] ? p9_client_prepare_req.part.0+0x3a/0xac0 [ 965.691786] should_failslab+0x5/0x20 [ 965.692651] kmem_cache_alloc+0x5b/0x310 [ 965.693575] p9_client_prepare_req.part.0+0x3a/0xac0 [ 965.694730] p9_client_rpc+0x220/0x1370 [ 965.695624] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 965.696827] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 965.698036] ? pipe_poll+0x21b/0x800 [ 965.698873] ? p9_fd_close+0x4a0/0x4a0 [ 965.699745] ? wait_for_partner+0x3c0/0x3c0 [ 965.700721] ? p9_fd_poll+0x1e0/0x2c0 [ 965.701590] ? p9_fd_create+0x357/0x4a0 [ 965.702482] ? p9_conn_create+0x510/0x510 [ 965.703413] ? p9_client_create+0x798/0x1230 [ 965.704413] ? kfree+0xd7/0x340 [ 965.705148] ? do_raw_spin_unlock+0x4f/0x220 [ 965.706144] p9_client_create+0xa76/0x1230 [ 965.707102] ? p9_client_flush+0x430/0x430 [ 965.708050] ? trace_hardirqs_on+0x5b/0x180 [ 965.709029] ? lockdep_init_map_type+0x2c7/0x780 [ 965.710091] ? __raw_spin_lock_init+0x36/0x110 [ 965.711129] v9fs_session_init+0x1dd/0x1680 [ 965.712110] ? lock_release+0x680/0x680 [ 965.712997] ? kmem_cache_alloc_trace+0x151/0x320 [ 965.714089] ? v9fs_show_options+0x690/0x690 [ 965.715097] ? trace_hardirqs_on+0x5b/0x180 [ 965.716088] ? kasan_unpoison_shadow+0x33/0x50 [ 965.717112] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 965.718265] v9fs_mount+0x79/0x8f0 [ 965.719061] ? v9fs_write_inode+0x60/0x60 [ 965.719991] legacy_get_tree+0x105/0x220 [ 965.720912] vfs_get_tree+0x8e/0x300 [ 965.721746] path_mount+0x1490/0x21e0 [ 965.722610] ? strncpy_from_user+0x9e/0x470 [ 965.723577] ? finish_automount+0xa90/0xa90 [ 965.724555] ? getname_flags.part.0+0x1dd/0x4f0 [ 965.725602] ? _copy_from_user+0xfb/0x1b0 [ 965.726537] __x64_sys_mount+0x282/0x300 [ 965.727448] ? copy_mnt_ns+0xa00/0xa00 [ 965.728331] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 965.729504] ? syscall_enter_from_user_mode+0x1d/0x50 [ 965.730660] do_syscall_64+0x33/0x40 [ 965.731497] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 965.732659] RIP: 0033:0x7f42b2db2b19 [ 965.733492] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 965.737627] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 965.739331] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 965.740939] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 965.742533] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 965.744135] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 965.745735] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 965.782059] loop3: detected capacity change from 0 to 41948160 [ 965.799474] FAULT_INJECTION: forcing a failure. [ 965.799474] name failslab, interval 1, probability 0, space 0, times 0 [ 965.802109] CPU: 0 PID: 7382 Comm: syz-executor.1 Not tainted 5.10.242 #1 [ 965.803614] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 965.805444] Call Trace: [ 965.806025] dump_stack+0x107/0x167 [ 965.806826] should_fail.cold+0x5/0xa [ 965.807665] ? create_object.isra.0+0x3a/0xa30 [ 965.808671] should_failslab+0x5/0x20 [ 965.809509] kmem_cache_alloc+0x5b/0x310 [ 965.810407] ? __ext4_find_entry+0x9f1/0xfc0 [ 965.811378] create_object.isra.0+0x3a/0xa30 [ 965.812355] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 965.813481] kmem_cache_alloc+0x159/0x310 [ 965.814390] ? ext4_dx_find_entry+0x600/0x600 [ 965.815391] jbd2__journal_start+0x190/0x7e0 [ 965.816381] __ext4_journal_start_sb+0x214/0x390 [ 965.817429] ext4_rename+0x96d/0x2bc0 [ 965.818272] ? ext4_tmpfile+0x440/0x440 [ 965.819164] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 965.820326] ? lock_acquire+0x197/0x470 [ 965.821199] ? vfs_rename+0xcb5/0x1510 [ 965.822067] ? lockref_get+0x11/0x50 [ 965.822879] ? find_held_lock+0x2c/0x110 [ 965.823802] ? down_write_nested+0xe4/0x160 [ 965.824755] ext4_rename2+0x1af/0x240 [ 965.825602] vfs_rename+0xd6c/0x1510 [ 965.826429] ? vfs_unlink+0x8b0/0x8b0 [ 965.827274] ? lookup_dcache+0x65/0x130 [ 965.828174] do_renameat2+0xae1/0xbf0 [ 965.829015] ? __ia32_sys_link+0x80/0x80 [ 965.829905] ? __virt_addr_valid+0x170/0x5d0 [ 965.830861] ? __check_object_size+0x319/0x440 [ 965.831884] __x64_sys_rename+0x7d/0xa0 [ 965.832762] do_syscall_64+0x33/0x40 [ 965.833577] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 965.834697] RIP: 0033:0x7f0d8d27eb19 [ 965.835511] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 965.839538] RSP: 002b:00007f0d8a7f4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 965.841217] RAX: ffffffffffffffda RBX: 00007f0d8d391f60 RCX: 00007f0d8d27eb19 [ 965.842775] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 965.844337] RBP: 00007f0d8a7f41d0 R08: 0000000000000000 R09: 0000000000000000 [ 965.845894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 965.847451] R13: 00007fffd1f2f40f R14: 00007f0d8a7f4300 R15: 0000000000022000 01:11:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 7) 01:11:06 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') renameat(r0, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0xffffffffffffffff, &(0x7f0000000200)='mnt/encrypted_dir\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:11:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x3, 0x0, 0x31, 0x6, 0x0, 0x2, 0x20000, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100000001, 0x80000000}, 0x100, 0xbb3, 0x4, 0x9, 0x100000001, 0x3f, 0x4, 0x0, 0x7fffffff, 0x0, 0x90}, 0x0, 0xa, r0, 0x1) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mmap(&(0x7f00007b1000/0x4000)=nil, 0x4000, 0x2000000, 0x10010, r1, 0x7fd67000) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:11:06 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r1, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file1', [{0x20, '*$!'}, {0x20, '$:,'}], 0xa, "6927345ae7d28a9e1ad095ea1ddb66bd22dfe23a87d5e021e920aa0e357e068ec3ce2d89c0299bea25c5f1b7de5344cecf121164747989201cd1b2ff2c17501d87bcb5a369a3064e54c74fece77f34c9e99de5f4d19839d814ba29ecb201afbf0cad14e7617d164d6494bc709ba337eaef3170fd4dea9a5455bbebc56a0f4ade127a0230a01aab7dce3024750667558721cd"}, 0xa5) sendmsg$NFNL_MSG_ACCT_DEL(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x3, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x4}, @NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x91b9}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x200}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x90}, 0x4000000) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x24, 0x24, 0xc21, 0x0, 0x0, {}, [@typed={0x4}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x24}}, 0x0) 01:11:06 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 35) 01:11:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 9) 01:11:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000140)='./file0\x00', 0x0, 0x8, &(0x7f0000002cc0)=[{&(0x7f0000002d80)="9de7dc51d9bc0076919aecb16eb5812b747cdefdd04e359d76938a5fbf936f39930ea22cbdd7f10b6d85219c07876050d5a4f42e66f108bad09b3f53ee6de2b974146f4811337893f091fd167044658a3015bfb33499dcc2ec143770c3c3e26b95c5fa81ca6c5f9559aa5c62a0fbc12f7e935c5762c06fe2ecf723c6984059cdc9dac495d3bd421098bc02ad973e0bb8222f3be5108dfab1543c565ea1014674a5", 0xa1, 0x2}, {&(0x7f0000001880)="b9e891908cbfc6a36a288280931dff02fb0ad78e5b4ac650c4bad978498deaa93284511c46ca7cae57a110d2f59bdefd55f4c03b96cfe95bfa0c8a839a35188be808fad81a1085bae10c7636bc698b1cbacf7e42800815098d16a07206003483ee9852ebffa3a5473c7929fd045581fe706cde7ac0190457545fb44c350d91b74430d761359ea70876f67566caf3db6d8953de3efee4a46c6d0116c618eede26c8747bc449522aed599bfe5be6f87d", 0xaf, 0x20}, {&(0x7f0000001940)="9e92bfba727e839cb3a83ea008a7f3c819cec0659790718744dd7d6f26bdbf38cc971c6cef6dd3edaaa4c033276ca7628d04ec7b8ed984137e0316134fb4830efc6ff7ddf6b82bf43a881e887bf75a6e048dbd0a8be0a0116c2e500702caf110194c736645cd7ea38e85af8c11176635909f5cff340d0e03e2a72af95668d8e53874b51d61b361c7ffe084989dcf732f5eb3", 0x92, 0x5}, {&(0x7f0000001a00)="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", 0x1000, 0x6d1e}, {&(0x7f0000002a00)="dfe20e7c4df17c3f90c2cb47225bf67ac4b1ecb3568c73abd28882b514e168f1837af0086d68788fefa5681e932bfa46bcdb2dd30132aa1284227f8ffb9ae76dad2ac5f61da6cdd8a156a6454929d40dfff7f503cae5282bbddfa23d4a4df95d69941be1e7529d64fd0f10e51145ea8e0441215f80d5c59e112caf195770dd58a6843818550df40f2ccf9bf5db4cab0379290194808a8cf54b81ef2d1a8ba6aa45f2d12efe0eb27d35a2d11786497a29adbec4a57c9dac81dd0b86f4e6ce3bd25f2ca0240a0b8fc10b495050", 0xcc, 0xde49}, {&(0x7f0000002b00)="4875ef084f1f12433a383ac4c4fbb7b8f7322479ae76432cf73335065e54102a5c8fd4b69b07e0e63eb24ee1e1e6283f37b5aa5dc5685885c849be573e8e24af3690f6e136862247ca4aa854169e182e270c0e2ce20f854e9b378a6820146acff503d0e0cf4e3f86727f0be43fd0cae366d1da1a1e7dc9b0d7a0431a8293d18d73ec71fa73f0d869d4f7b267781ba1681839005907a34687948479a8f47d12e62ffbede1749eaa7fc50fb745136b2a366fd052c89a8e584f18c86c4d0c19f974343294f6852c9e3503915da2dff0211c77f241aa377250ed5e37b1f6535f9ef649f230", 0xe3, 0x3}, {&(0x7f0000002c00)="7c992013cdd54033f667ffad683b818eae21e447e75e209b7cbfcc6a391cc6e520165281aac5df7e16d03c5ea98a1146c058421b328c91aa1367d8f742d4396ab0d33a48936af42f0d3aedf8488d420295e5a366daff4ba9598a23ebebe03b756fdf254c18ffe6cd12723f06fe6b3af894c77fdc3a2f9387fad2b16d126d1a6a4439fc80c2e17a5f10d7e1b9bdd431f9c5fdb451", 0x94, 0x5e}, {&(0x7f00000000c0), 0x0, 0x5}], 0x2800018, &(0x7f0000000240)=ANY=[]) [ 979.843481] loop3: detected capacity change from 0 to 113664 [ 979.853895] FAT-fs (loop3): invalid media value (0x24) [ 979.855307] FAT-fs (loop3): Can't find a valid FAT filesystem [ 979.868724] loop3: detected capacity change from 0 to 121344 r0 = syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000380)='./mnt\x00', 0x0, 0x5, &(0x7f00000016c0)=[{&(0x7f00000003c0)="dd46cd6d770dfe0395809c41fb6e73d001539b2c1edb4ce8d965f22f1ecfe79b9e41ba2c407b923d714df33c55a535b1a2bd74df0c3207116dd89b43f8765572368587e44b8de5a666c0a1748edc60e17b3ae4927a04f736943d8d75dc33947ad05d2415fd3d1004d90188554d68bdfced4be6ef71f5f72cac73f871f0a4d64c7675e9cd5f626d3f9eb3a9ff9deec218373261ceb3440bc6a886e4c817939a2c1d3e1ed2819ee9e9f2b5dea59143057fafd4d7b35042a50a49a87d67bb86c44c835bb4521c718189be22776b087bf49052f992503c98ec96bdac0a2bea06c3248ab6e4af0d85632401f15c", 0xeb, 0x4}, {&(0x7f0000000500)="eb73fdc0f5d367b405d954a45a039ff9399e3b89d25b05bbfae73fd074b495c1ee09bdc5cee974607705bb378558e5f035805fc267e78096bc8f1ce33f9fa515eccf64821718ccf2e55277f698e9c70e68ecf1ea764873499986dcc54822ff0fe0942558d0f602d61b3e2312130a0e7e93fff9858480ed9582132c66c6224e95fbb4cdb9fec5c950a980a922622f7ab041e46f2284bbee9d70f4a8c8ec420911738a16a9b358447f8d047746010f2a3ed767dd9d72271b8417e8ae", 0xbb, 0x4}, {&(0x7f00000005c0)="365f408f9ff141e1", 0x8, 0xed5b}, {&(0x7f0000000600)="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", 0x1000, 0x2}, {&(0x7f0000001600)="a7ba43d7d5df14993d6267c39e36047b7ee6581c62dd1d0b1d2b72d1ea87ec1e0da4df85f563bd0aa026eaeb9ee749cbc7cd4928ccc5e42d1462a9fabe4aeabff1bb296997e330e6ad39fb6b16c60527ae84d313c41dc3769d188910980b137ec8b8c80f60d36609c03a12b6f906c7d06e6a5a11a21c4502444dc8a210a79dfa88", 0x81, 0x80}], 0x8000, &(0x7f0000002e40)=ANY=[@ANYBLOB="757466383d312c756e0200000000000000302c73686f72746e6197073cc30ea3b5602c756e695f786c6174653d302c65000000003dba9250e1c33476c6fc438d636ab2e7d2168bd9da40ae00ab34fa87616dc5184cda57957ef5856cae57f25393dda5fc03f45903160e46008a8bf1b5db1af5d86be66ce210be6f8ac0e105c7c776f23cf68aef36729a19163c96efe7b596dd0d9f11616e44eac70553cf0418ef5750", @ANYRESDEC, @ANYBLOB="2c6673757569643d63613435323332312d383564332d653339392d0e3730002d37653863633738382c00"]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0x100, 0x12) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') openat(r1, &(0x7f0000000200)='./file1\x00', 0x4000, 0x1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x10200, 0x0) r3 = dup(r0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x4, 0x70, 0x9, 0x0, 0x9, 0x88600, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000240), 0xb}, 0x40000, 0x81, 0x4, 0x0, 0x8, 0x7, 0x2, 0x0, 0x1000, 0x0, 0x1}, 0x0, 0x9, r2, 0x2) [ 979.884931] loop2: detected capacity change from 0 to 41948160 01:11:06 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000400)='mnt/encrypted_dir/file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) unlinkat(r0, &(0x7f00000003c0)='mnt/encrypted_dir/file0\x00', 0x200) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='mnt/encrypted_dir/file0\x00', 0x0) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r2 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000300)='mnt/encrypted_dir\x00', &(0x7f0000000340)={0x2002, 0x10, 0x8}, 0x18) mkdirat(r2, &(0x7f0000000380)='mnt/encrypted_dir/file0\x00', 0x4) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000200)={'wg1\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3ea181303af655dec5407a0050cf67bd9d2abed0c2d838fa586c540000faffff"]}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xb6, 0x29, 0x1, {0x5, [{{0x80, 0x1, 0x7}, 0x0, 0x0, 0x11, 'mnt/encrypted_dir'}, {{0x0, 0x1, 0x4}, 0x3, 0x1, 0x11, 'mnt/encrypted_dir'}, {{0x8, 0x0, 0x3}, 0x0, 0xff, 0x7, './file0'}, {{0x4, 0x4, 0x5}, 0x2, 0x0, 0x5, './mnt'}, {{0x80, 0x0, 0x3}, 0x0, 0x5, 0x5, './mnt'}]}}, 0xb6) rename(&(0x7f0000000480)='mnt/encrypted_dir/file0\x00', &(0x7f0000000440)='mnt/encrypted_dir/file1\x00') [ 979.904019] loop4: detected capacity change from 0 to 41948160 [ 979.907710] FAULT_INJECTION: forcing a failure. [ 979.907710] name failslab, interval 1, probability 0, space 0, times 0 [ 979.910488] CPU: 0 PID: 7406 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 979.912167] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 979.914184] Call Trace: [ 979.914832] dump_stack+0x107/0x167 [ 979.915731] should_fail.cold+0x5/0xa [ 979.916675] ? create_object.isra.0+0x3a/0xa30 [ 979.917797] should_failslab+0x5/0x20 [ 979.918744] kmem_cache_alloc+0x5b/0x310 [ 979.919740] create_object.isra.0+0x3a/0xa30 [ 979.920820] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 979.922078] kmem_cache_alloc+0x159/0x310 [ 979.923101] p9_client_prepare_req.part.0+0x3a/0xac0 [ 979.924362] p9_client_rpc+0x220/0x1370 [ 979.925336] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 979.926631] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 979.927938] ? pipe_poll+0x21b/0x800 [ 979.928858] ? p9_fd_close+0x4a0/0x4a0 [ 979.929810] ? wait_for_partner+0x3c0/0x3c0 [ 979.930873] ? p9_fd_poll+0x1e0/0x2c0 [ 979.931812] ? p9_fd_create+0x357/0x4a0 [ 979.932786] ? p9_conn_create+0x510/0x510 [ 979.933795] ? p9_client_create+0x798/0x1230 [ 979.934865] ? kfree+0xd7/0x340 [ 979.935664] ? do_raw_spin_unlock+0x4f/0x220 [ 979.936763] p9_client_create+0xa76/0x1230 [ 979.937811] ? p9_client_flush+0x430/0x430 [ 979.938843] ? trace_hardirqs_on+0x5b/0x180 [ 979.939897] ? lockdep_init_map_type+0x2c7/0x780 [ 979.941067] ? __raw_spin_lock_init+0x36/0x110 [ 979.942190] v9fs_session_init+0x1dd/0x1680 [ 979.943249] ? lock_release+0x680/0x680 [ 979.944243] ? kmem_cache_alloc_trace+0x151/0x320 [ 979.945428] ? v9fs_show_options+0x690/0x690 [ 979.946516] ? trace_hardirqs_on+0x5b/0x180 [ 979.947594] ? kasan_unpoison_shadow+0x33/0x50 [ 979.948726] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 979.949974] v9fs_mount+0x79/0x8f0 [ 979.950844] ? v9fs_write_inode+0x60/0x60 [ 979.951858] legacy_get_tree+0x105/0x220 [ 979.952874] vfs_get_tree+0x8e/0x300 [ 979.953791] path_mount+0x1490/0x21e0 [ 979.954736] ? strncpy_from_user+0x9e/0x470 [ 979.955802] ? finish_automount+0xa90/0xa90 [ 979.956863] ? getname_flags.part.0+0x1dd/0x4f0 [ 979.958003] ? _copy_from_user+0xfb/0x1b0 [ 979.959029] __x64_sys_mount+0x282/0x300 [ 979.960025] ? copy_mnt_ns+0xa00/0xa00 [ 979.961003] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 979.962306] ? syscall_enter_from_user_mode+0x1d/0x50 [ 979.963577] do_syscall_64+0x33/0x40 [ 979.964502] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 979.965766] RIP: 0033:0x7f42b2db2b19 [ 979.966682] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 979.966967] FAULT_INJECTION: forcing a failure. [ 979.966967] name failslab, interval 1, probability 0, space 0, times 0 [ 979.971198] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 979.971221] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 979.971233] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 979.971245] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 979.971257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 979.971268] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 979.971857] loop1: detected capacity change from 0 to 41948160 [ 979.973761] CPU: 1 PID: 7416 Comm: syz-executor.2 Not tainted 5.10.242 #1 [ 979.985900] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 979.987685] Call Trace: [ 979.988265] dump_stack+0x107/0x167 [ 979.989053] should_fail.cold+0x5/0xa [ 979.989878] ? __d_alloc+0x2a/0x990 [ 979.990663] should_failslab+0x5/0x20 [ 979.991481] kmem_cache_alloc+0x5b/0x310 [ 979.992354] ? __d_lookup+0x3bf/0x760 [ 979.993188] __d_alloc+0x2a/0x990 [ 979.993937] d_alloc+0x46/0x1c0 [ 979.994650] __lookup_hash+0xcc/0x190 [ 979.995469] do_renameat2+0x51f/0xbf0 [ 979.996313] ? __ia32_sys_link+0x80/0x80 [ 979.997203] ? __virt_addr_valid+0x170/0x5d0 [ 979.998152] ? __check_object_size+0x319/0x440 [ 979.999159] ? getname_flags.part.0+0x1dd/0x4f0 [ 980.000172] __x64_sys_rename+0x7d/0xa0 [ 980.001049] do_syscall_64+0x33/0x40 [ 980.001855] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 980.002961] RIP: 0033:0x7f26c16eeb19 [ 980.003754] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 980.007732] RSP: 002b:00007f26bec43188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 980.009378] RAX: ffffffffffffffda RBX: 00007f26c1802020 RCX: 00007f26c16eeb19 [ 980.010916] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 980.012473] RBP: 00007f26bec431d0 R08: 0000000000000000 R09: 0000000000000000 [ 980.014024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 980.015570] R13: 00007ffe1c79efff R14: 00007f26bec43300 R15: 0000000000022000 01:11:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800048, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 980.039226] loop6: detected capacity change from 0 to 41948160 [ 980.043724] FAULT_INJECTION: forcing a failure. [ 980.043724] name failslab, interval 1, probability 0, space 0, times 0 [ 980.046539] CPU: 0 PID: 7419 Comm: syz-executor.1 Not tainted 5.10.242 #1 [ 980.048231] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 980.050291] Call Trace: [ 980.050953] dump_stack+0x107/0x167 [ 980.051859] should_fail.cold+0x5/0xa [ 980.052814] ? jbd2__journal_start+0x190/0x7e0 [ 980.053952] should_failslab+0x5/0x20 [ 980.054897] kmem_cache_alloc+0x5b/0x310 [ 980.055894] ? ext4_dx_find_entry+0x600/0x600 [ 980.057024] jbd2__journal_start+0x190/0x7e0 [ 980.058122] __ext4_journal_start_sb+0x214/0x390 [ 980.059295] ext4_rename+0x96d/0x2bc0 [ 980.060257] ? ext4_tmpfile+0x440/0x440 [ 980.061237] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 980.062549] ? lock_acquire+0x197/0x470 [ 980.063536] ? vfs_rename+0xcb5/0x1510 [ 980.064524] ? lockref_get+0x11/0x50 [ 980.065440] ? find_held_lock+0x2c/0x110 [ 980.066463] ? down_write_nested+0xe4/0x160 [ 980.067537] ext4_rename2+0x1af/0x240 [ 980.068493] vfs_rename+0xd6c/0x1510 [ 980.069420] ? vfs_unlink+0x8b0/0x8b0 [ 980.070363] ? _raw_spin_unlock+0x1a/0x30 [ 980.071400] do_renameat2+0xae1/0xbf0 [ 980.072363] ? __ia32_sys_link+0x80/0x80 [ 980.073384] ? __virt_addr_valid+0x170/0x5d0 [ 980.074474] ? __check_object_size+0x319/0x440 [ 980.075634] __x64_sys_rename+0x7d/0xa0 [ 980.076626] do_syscall_64+0x33/0x40 [ 980.077542] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 980.078817] RIP: 0033:0x7f0d8d27eb19 [ 980.079736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 980.084332] RSP: 002b:00007f0d8a7d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 980.086220] RAX: ffffffffffffffda RBX: 00007f0d8d392020 RCX: 00007f0d8d27eb19 [ 980.087990] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 980.089760] RBP: 00007f0d8a7d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 980.091532] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 980.093305] R13: 00007fffd1f2f40f R14: 00007f0d8a7d3300 R15: 0000000000022000 01:11:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x8, &(0x7f00000006c0)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}, {&(0x7f0000000200)="203c0db94ed6ed8195a4f4c1971a9582c0cea6d0d24270e260fd7e0b014028612be8d90137", 0x25, 0x2}, {&(0x7f00000002c0)="863d7efa32c332a91e24de87d7c036c15e6f90272aca07718e50896d479c46210165729facffa9f64fb5b7040339bc04f40973e4d2782a32a44a912616a544fa6d1c352c139b24720d81c9a4001f191b167b20302624f334119691c813dfcb024313ec187c8548275c01c95e6d264e95b74ac34af2e78815701b2403325f4281723133fbef706d58f6c0d9121c3081e9255b5c25d12115414d599a8885be3c12031242ee078f1f4f797381f54ff0ce33a6c6c36d8a0109a58aed9d", 0xbb, 0x4}, {&(0x7f0000000380)="ef1de8a20c86b8204053f92472fc9a0b067a8d47494b47f1e39d3db393778e124a3c2ea5a8e5de144cef3cbab441728f79c3724437812c6f1504b5bfeb7d70afa8f763eea2f3b8fe346435e4", 0x4c, 0x2}, {&(0x7f0000000400)="bbbe5b94845e8833cc362cfef207817ea7aecdcf72f55e9a", 0x18, 0x7f}, {&(0x7f0000000500)="1b746a9bcb6c402641376ecede946a1ced4dcb12bbcfe1ea97836738ec5da1b28dbc07f0f2cf19426b41fa0a97b95077dc4757283f10b8ad5b8860fe38ad87ec813eb1694eebcbc53d54ad37670658509c14b93a4ef68d8195b35a0be72c77bfff1ef67c344c4ea6f2262f3b2c2b84e12a8a71fe06e6e0123fed4a3823f487424e4392e33a46e94b12918ad5c7bc223261d081f6249ca367c62da9a6b629d55838d0a4bd7781438c410f6b656be837be237a96c0d71b59fff41e132f46373945b85fdd170d3550b42977531591bb48e93cf2421082d10fbdb0eb39c438ce17a0fc5b428febb6f9", 0xe7, 0x8}, {&(0x7f0000000600)="0fe7628e2ed6f441e8314b422e3e1a69ac6780b0041ccdb884e6996d0e93636998623a3c7f32e481112f657f0bf732e7056fabc40ddab302a993a61ec0e5331e20d35cace0e577c9905004cab18b32c18357e96a97e09686adfece5ceed39ee4ac30e2d0f4686e522587ca325e211b3a7f8382415e4a61649cd17c02d08f37fac79b310c9fc020346b67c208a1506c534f78153b2003c719c6ab14", 0x9b, 0x8}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './mnt\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:11:07 executing program 7: r0 = fsopen(&(0x7f00000000c0)='rpc_pipefs\x00', 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xfef}, 0x40040, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r2, r0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x100000d, 0x2010, r1, 0x0) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000200), 0x200280, 0x0) ioctl$HIDIOCAPPLICATION(r4, 0x4802, 0x4) r5 = syz_io_uring_setup(0x4ac7, &(0x7f0000000000)={0x0, 0x3d1d, 0x10, 0x2, 0xbf, 0x0, r1}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)=0x0) r7 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000000)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r10}}, 0x0) syz_io_uring_submit(r3, r6, &(0x7f0000000140)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x2, 0x4007, @fd_index=0x7, 0x80000000, 0x0, 0x0, 0x10, 0x1, {0x2, r10}}, 0x1) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r4, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r5, {r1}}, './file0\x00'}) fsconfig$FSCONFIG_SET_FD(r4, 0x5, &(0x7f0000000240)='\\-$\x00', 0x0, r11) [ 980.220164] loop3: detected capacity change from 0 to 113664 01:11:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 8) [ 980.262843] FAT-fs (loop3): invalid media value (0x24) [ 980.264802] FAT-fs (loop3): Can't find a valid FAT filesystem 01:11:07 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 36) [ 980.302495] loop5: detected capacity change from 0 to 135266304 [ 980.317926] ====================================================== [ 980.317926] WARNING: the mand mount option is being deprecated and [ 980.317926] will be removed in v5.15! [ 980.317926] ====================================================== [ 980.325155] FAULT_INJECTION: forcing a failure. [ 980.325155] name failslab, interval 1, probability 0, space 0, times 0 [ 980.327691] CPU: 1 PID: 7440 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 980.329182] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 980.330979] Call Trace: [ 980.331565] dump_stack+0x107/0x167 [ 980.332382] should_fail.cold+0x5/0xa [ 980.333232] ? p9_fcall_init+0x97/0x290 [ 980.334094] should_failslab+0x5/0x20 [ 980.334909] __kmalloc+0x72/0x390 [ 980.335664] p9_fcall_init+0x97/0x290 [ 980.336496] p9_client_prepare_req.part.0+0x8c/0xac0 [ 980.337597] p9_client_rpc+0x220/0x1370 [ 980.338452] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 980.339588] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 980.340747] ? pipe_poll+0x21b/0x800 [ 980.341550] ? p9_fd_close+0x4a0/0x4a0 [ 980.342386] ? wait_for_partner+0x3c0/0x3c0 [ 980.343321] ? p9_fd_poll+0x1e0/0x2c0 [ 980.344149] ? p9_fd_create+0x357/0x4a0 [ 980.345013] ? p9_conn_create+0x510/0x510 [ 980.345901] ? p9_client_create+0x798/0x1230 [ 980.346853] ? kfree+0xd7/0x340 [ 980.347561] ? do_raw_spin_unlock+0x4f/0x220 [ 980.348543] p9_client_create+0xa76/0x1230 [ 980.349462] ? p9_client_flush+0x430/0x430 [ 980.350388] ? trace_hardirqs_on+0x5b/0x180 [ 980.351342] ? lockdep_init_map_type+0x2c7/0x780 [ 980.352394] ? __raw_spin_lock_init+0x36/0x110 [ 980.353404] v9fs_session_init+0x1dd/0x1680 [ 980.354352] ? lock_release+0x680/0x680 [ 980.355225] ? kmem_cache_alloc_trace+0x151/0x320 [ 980.356296] ? v9fs_show_options+0x690/0x690 [ 980.357269] ? trace_hardirqs_on+0x5b/0x180 [ 980.358214] ? kasan_unpoison_shadow+0x33/0x50 [ 980.359215] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 980.360329] v9fs_mount+0x79/0x8f0 [ 980.361108] ? v9fs_write_inode+0x60/0x60 [ 980.362018] legacy_get_tree+0x105/0x220 [ 980.362906] vfs_get_tree+0x8e/0x300 [ 980.363720] path_mount+0x1490/0x21e0 [ 980.364566] ? strncpy_from_user+0x9e/0x470 [ 980.365507] ? finish_automount+0xa90/0xa90 [ 980.366452] ? getname_flags.part.0+0x1dd/0x4f0 [ 980.367462] ? _copy_from_user+0xfb/0x1b0 [ 980.368385] __x64_sys_mount+0x282/0x300 [ 980.369266] ? copy_mnt_ns+0xa00/0xa00 [ 980.370124] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 980.371271] ? syscall_enter_from_user_mode+0x1d/0x50 [ 980.372411] do_syscall_64+0x33/0x40 [ 980.373214] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 980.374337] RIP: 0033:0x7f42b2db2b19 [ 980.375133] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 980.379127] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 980.380784] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 980.382324] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 980.383870] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 980.385430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 980.386958] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 980.393363] FAT-fs (loop4): bogus number of reserved sectors [ 980.394956] FAT-fs (loop4): Can't find a valid FAT filesystem 01:11:07 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 37) 01:11:07 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = dup3(r0, r0, 0x0) openat2(r1, &(0x7f0000000000)='mnt/encrypted_dir\x00', &(0x7f0000000200)={0x2, 0x30, 0x18}, 0x18) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 980.453802] loop2: detected capacity change from 0 to 41948160 01:11:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 10) 01:11:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2900019, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chown(&(0x7f0000000200)='./file1\x00', 0x0, 0xffffffffffffffff) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 980.514432] loop1: detected capacity change from 0 to 41948160 [ 980.519706] FAULT_INJECTION: forcing a failure. [ 980.519706] name failslab, interval 1, probability 0, space 0, times 0 [ 980.522541] CPU: 0 PID: 7449 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 980.524232] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 980.526263] Call Trace: [ 980.526921] dump_stack+0x107/0x167 [ 980.527832] should_fail.cold+0x5/0xa [ 980.528780] ? p9_fcall_init+0x97/0x290 [ 980.529216] FAULT_INJECTION: forcing a failure. [ 980.529216] name failslab, interval 1, probability 0, space 0, times 0 [ 980.529762] should_failslab+0x5/0x20 [ 980.529784] __kmalloc+0x72/0x390 [ 980.529813] p9_fcall_init+0x97/0x290 [ 980.529841] p9_client_prepare_req.part.0+0x8c/0xac0 [ 980.529875] p9_client_rpc+0x220/0x1370 [ 980.529900] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 980.538533] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 980.539850] ? pipe_poll+0x21b/0x800 [ 980.540767] ? p9_fd_close+0x4a0/0x4a0 [ 980.541718] ? wait_for_partner+0x3c0/0x3c0 [ 980.542771] ? p9_fd_poll+0x1e0/0x2c0 [ 980.543712] ? p9_fd_create+0x357/0x4a0 [ 980.544694] ? p9_conn_create+0x510/0x510 [ 980.545717] ? p9_client_create+0x798/0x1230 [ 980.546795] ? kfree+0xd7/0x340 [ 980.547603] ? do_raw_spin_unlock+0x4f/0x220 [ 980.548699] p9_client_create+0xa76/0x1230 [ 980.549757] ? p9_client_flush+0x430/0x430 [ 980.550802] ? trace_hardirqs_on+0x5b/0x180 [ 980.551871] ? lockdep_init_map_type+0x2c7/0x780 [ 980.553060] ? __raw_spin_lock_init+0x36/0x110 [ 980.554199] v9fs_session_init+0x1dd/0x1680 [ 980.555266] ? lock_release+0x680/0x680 [ 980.556265] ? kmem_cache_alloc_trace+0x151/0x320 [ 980.557458] ? v9fs_show_options+0x690/0x690 [ 980.558549] ? trace_hardirqs_on+0x5b/0x180 [ 980.559605] ? kasan_unpoison_shadow+0x33/0x50 [ 980.560731] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 980.561984] v9fs_mount+0x79/0x8f0 [ 980.562854] ? v9fs_write_inode+0x60/0x60 [ 980.563865] legacy_get_tree+0x105/0x220 [ 980.564873] vfs_get_tree+0x8e/0x300 [ 980.565790] path_mount+0x1490/0x21e0 [ 980.566736] ? strncpy_from_user+0x9e/0x470 [ 980.567796] ? finish_automount+0xa90/0xa90 [ 980.568854] ? getname_flags.part.0+0x1dd/0x4f0 [ 980.569997] ? _copy_from_user+0xfb/0x1b0 [ 980.571026] __x64_sys_mount+0x282/0x300 [ 980.572023] ? copy_mnt_ns+0xa00/0xa00 [ 980.572991] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 980.574270] ? syscall_enter_from_user_mode+0x1d/0x50 [ 980.575541] do_syscall_64+0x33/0x40 [ 980.576458] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 980.577722] RIP: 0033:0x7f42b2db2b19 [ 980.578642] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 980.583203] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 980.585089] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 980.586848] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 980.588604] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 980.590363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 980.592110] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 980.593915] CPU: 1 PID: 7453 Comm: syz-executor.1 Not tainted 5.10.242 #1 [ 980.595410] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 980.597211] Call Trace: [ 980.597787] dump_stack+0x107/0x167 [ 980.598580] should_fail.cold+0x5/0xa [ 980.599420] ? create_object.isra.0+0x3a/0xa30 [ 980.600429] should_failslab+0x5/0x20 [ 980.601266] kmem_cache_alloc+0x5b/0x310 [ 980.602157] create_object.isra.0+0x3a/0xa30 [ 980.602553] FAULT_INJECTION: forcing a failure. [ 980.602553] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 980.603109] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 980.603145] kmem_cache_alloc+0x159/0x310 [ 980.607921] fat_parse_long.constprop.0+0x8e9/0xb50 [ 980.609003] ? vfat_lookup+0xeb/0x610 [ 980.609840] fat_search_long+0x380/0xd90 [ 980.610731] ? fat_parse_short+0xd30/0xd30 [ 980.611635] ? vfat_lookup+0xeb/0x610 [ 980.612480] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 980.613608] ? SOFTIRQ_verbose+0x10/0x10 [ 980.614482] ? find_held_lock+0x2c/0x110 [ 980.615375] ? lock_acquire+0x197/0x470 [ 980.616242] ? find_held_lock+0x2c/0x110 [ 980.617125] vfat_lookup+0x2d4/0x610 [ 980.617934] ? vfat_revalidate+0x190/0x190 [ 980.618835] ? rwlock_bug.part.0+0x90/0x90 [ 980.619753] ? do_raw_spin_unlock+0x4f/0x220 [ 980.620710] ? _raw_spin_unlock+0x1a/0x30 [ 980.621592] __lookup_hash+0x121/0x190 [ 980.622416] do_renameat2+0x51f/0xbf0 [ 980.623233] ? __ia32_sys_link+0x80/0x80 [ 980.624106] ? __virt_addr_valid+0x170/0x5d0 [ 980.625042] ? __check_object_size+0x319/0x440 [ 980.626021] ? getname_flags.part.0+0x1dd/0x4f0 [ 980.627023] __x64_sys_rename+0x7d/0xa0 [ 980.627860] do_syscall_64+0x33/0x40 [ 980.628651] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 980.629732] RIP: 0033:0x7f0d8d27eb19 [ 980.630521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 980.634386] RSP: 002b:00007f0d8a7f4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 980.635991] RAX: ffffffffffffffda RBX: 00007f0d8d391f60 RCX: 00007f0d8d27eb19 [ 980.637496] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 980.639003] RBP: 00007f0d8a7f41d0 R08: 0000000000000000 R09: 0000000000000000 [ 980.640508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 980.642009] R13: 00007fffd1f2f40f R14: 00007f0d8a7f4300 R15: 0000000000022000 [ 980.643551] CPU: 0 PID: 7456 Comm: syz-executor.2 Not tainted 5.10.242 #1 [ 980.645280] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 980.647334] Call Trace: [ 980.647993] dump_stack+0x107/0x167 [ 980.648902] should_fail.cold+0x5/0xa [ 980.649837] _copy_from_user+0x2e/0x1b0 [ 980.650807] kstrtouint_from_user+0xbd/0x220 [ 980.651884] ? kstrtou8_from_user+0x210/0x210 [ 980.653000] ? lock_acquire+0x197/0x470 [ 980.653978] ? ksys_write+0x12d/0x260 [ 980.654927] proc_fail_nth_write+0x78/0x220 [ 980.655984] ? proc_task_getattr+0x1f0/0x1f0 [ 980.657070] ? proc_task_getattr+0x1f0/0x1f0 [ 980.658143] vfs_write+0x29a/0xb10 [ 980.659030] ksys_write+0x12d/0x260 [ 980.659933] ? __ia32_sys_read+0xb0/0xb0 [ 980.660939] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 980.662237] ? syscall_enter_from_user_mode+0x1d/0x50 [ 980.663503] do_syscall_64+0x33/0x40 [ 980.664426] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 980.665696] RIP: 0033:0x7f26c16a15ff [ 980.666611] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 980.671133] RSP: 002b:00007f26bec43170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 980.673007] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f26c16a15ff [ 980.674742] RDX: 0000000000000001 RSI: 00007f26bec431e0 RDI: 0000000000000003 [ 980.676503] RBP: 00007f26bec431d0 R08: 0000000000000000 R09: 0000000000000000 [ 980.678245] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 980.680003] R13: 00007ffe1c79efff R14: 00007f26bec43300 R15: 0000000000022000 [ 980.696592] loop6: detected capacity change from 0 to 41948160 [ 980.699066] FAT-fs (loop4): bogus number of reserved sectors [ 980.700627] FAT-fs (loop4): Can't find a valid FAT filesystem 01:11:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) openat(r0, &(0x7f0000000000)='./mnt\x00', 0x101800, 0x80) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) r2 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) io_uring_enter(r2, 0x58ab, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000200)={"3fcb8a3b239023d6eafae2796edaacca", 0x0, 0x0, {0x10000, 0x400}, {0x80000000, 0x7}, 0x7, [0x6, 0x3, 0x6, 0x200, 0x401, 0x3, 0x5, 0xfcf4, 0x4, 0xfffffffffffffffb, 0x8001, 0x82, 0x1, 0xffffffffffffffff, 0x7, 0x3ff]}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000500)={{r2}, r3, 0x8, @unused=[0x0, 0x800, 0x2, 0x1], @subvolid=0x1ff}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:11:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 11) 01:11:07 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0xfffffffffffffff9}, {0x0, 0x31, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./mnt\x00', 0x43) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) [ 980.807572] loop5: detected capacity change from 0 to 41948160 [ 980.838290] loop1: detected capacity change from 0 to 41948160 [ 980.842409] loop5: detected capacity change from 0 to 41948160 01:11:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) syz_io_uring_complete(0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x88) openat(0xffffffffffffffff, &(0x7f0000000ac0)='./file1\x00', 0x82d01, 0x30) setsockopt$WPAN_SECURITY_LEVEL(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000240), 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46042e000000000000000000000000000000000000000000008000000040000000000000007003000000000000ff010000000038000200ffff00005afd070000000000000000000000000000003bdf00000000000005000000000000000000000000000000000000000000000000000000000000000000b245c7e800"/445], 0x278) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) io_uring_enter(r2, 0x58ab, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='mnt/encrypted_dir\x00', &(0x7f0000000200), 0x5400, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cachetag={'cachetag', 0x3d, '//{5'}}, {@posixacl}, {@access_any}, {@privport}, {@noextend}, {@cache_loose}, {@cachetag}, {@privport}], [{@appraise}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'vfat\x00'}}]}}) [ 980.878591] FAT-fs (loop6): bogus number of reserved sectors [ 980.880249] FAT-fs (loop6): Can't find a valid FAT filesystem 01:11:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='./mnt\x00', &(0x7f00000001c0)='./file0\x00') [ 980.900201] FAULT_INJECTION: forcing a failure. [ 980.900201] name failslab, interval 1, probability 0, space 0, times 0 [ 980.903006] CPU: 1 PID: 7469 Comm: syz-executor.1 Not tainted 5.10.242 #1 [ 980.904462] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 980.905112] FAT-fs (loop6): bogus number of reserved sectors [ 980.906283] Call Trace: [ 980.906324] dump_stack+0x107/0x167 [ 980.906350] should_fail.cold+0x5/0xa [ 980.907748] FAT-fs (loop6): Can't find a valid FAT filesystem [ 980.908300] ? fat_parse_long.constprop.0+0x8e9/0xb50 [ 980.912321] should_failslab+0x5/0x20 [ 980.913153] kmem_cache_alloc+0x5b/0x310 [ 980.914060] fat_parse_long.constprop.0+0x8e9/0xb50 [ 980.915158] ? vfat_rename+0x1bb/0xf60 [ 980.916033] fat_search_long+0x380/0xd90 [ 980.916955] ? fat_parse_short+0xd30/0xd30 [ 980.917885] ? vfat_rename+0x1bb/0xf60 [ 980.918772] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 980.919930] ? SOFTIRQ_verbose+0x10/0x10 [ 980.920844] vfat_rename+0x3a0/0xf60 [ 980.921670] ? vfat_mkdir+0x440/0x440 [ 980.922507] ? lock_release+0x680/0x680 [ 980.923378] ? lock_acquire+0x197/0x470 [ 980.924270] ? lockref_get+0x11/0x50 [ 980.925088] ? find_held_lock+0x2c/0x110 [ 980.925994] ? down_write_nested+0xe4/0x160 [ 980.926935] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 980.928065] vfs_rename+0xd6c/0x1510 [ 980.928898] ? vfs_unlink+0x8b0/0x8b0 [ 980.929745] ? _raw_spin_unlock+0x1a/0x30 [ 980.930664] do_renameat2+0xae1/0xbf0 [ 980.931511] ? __ia32_sys_link+0x80/0x80 [ 980.932418] ? __virt_addr_valid+0x170/0x5d0 [ 980.933393] ? __check_object_size+0x319/0x440 [ 980.934436] __x64_sys_rename+0x7d/0xa0 [ 980.935309] do_syscall_64+0x33/0x40 [ 980.936125] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 980.937266] RIP: 0033:0x7f0d8d27eb19 [ 980.938084] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 980.942151] RSP: 002b:00007f0d8a7f4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 980.943828] RAX: ffffffffffffffda RBX: 00007f0d8d391f60 RCX: 00007f0d8d27eb19 [ 980.945409] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 980.946968] RBP: 00007f0d8a7f41d0 R08: 0000000000000000 R09: 0000000000000000 [ 980.948542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 980.950117] R13: 00007fffd1f2f40f R14: 00007f0d8a7f4300 R15: 0000000000022000 [ 980.991197] loop3: detected capacity change from 0 to 41948160 [ 981.004107] loop4: detected capacity change from 0 to 41948160 01:11:25 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:11:25 executing program 7: r0 = syz_io_uring_setup(0x132, &(0x7f0000000180)={0x0, 0x43b3, 0x8, 0xfffffffe}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r4, 0x0, 0x0}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x2010, r0, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x543147, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) r7 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x8}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r7, 0x0) io_uring_enter(r7, 0x58ab, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) syz_open_dev$ttys(0xc, 0x2, 0x0) r8 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x10, 0x0, 0x20000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r8, 0x0) io_uring_enter(r8, 0x58ab, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 01:11:25 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 38) [ 998.132130] loop5: detected capacity change from 0 to 41948160 01:11:25 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file1\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='mnt/encrypted_dir\x00', 0x882c2, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) openat(r0, &(0x7f0000000000)='./mnt\x00', 0x24800, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:11:25 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) openat(r0, &(0x7f0000001680)='./file2\x00', 0x26081, 0x9c) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') rename(&(0x7f0000001600)='./file1\x00', &(0x7f0000001640)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x363001, 0x40) stat(&(0x7f0000000440)='mnt/encrypted_dir\x00', &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000480)='./file1\x00', 0x100, 0x3, &(0x7f00000003c0)=[{&(0x7f0000001580)="4ddf66964a822849188706a737f410e1fc711086e12e985c1c8f7d96b0832cf92dee0afdad589789ee5147e48d202d6744efb80c82b9335fc059de471bfb380858fda5b9f1eee56dd940d41284986fc4161b175b32e5e17d81", 0x59, 0xfffffffffffffff9}, {&(0x7f0000000500)="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", 0x1000, 0x41dc}, {&(0x7f00000002c0)="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", 0xfb, 0xdd08}], 0x80080, &(0x7f0000001880)=ANY=[@ANYRESOCT=r1, @ANYBLOB="dd807bc154cfa9abeb1e9e6f550a30e1ceb107d685abeb059dada489fbfcbbd9cac8a2b78a53eb540395ea23e185974fc007a89be62c27db6fce3bfc56810d42341ca898662b9fbaf69fa926933b63c09be0061338ac685ed63e06c8fa944dd395f7c7a508630ca863aeef34f1a65a03bfa9f28d98db551d322a4d05939902258e4f11c296bb83ce555e0399d86dce898d986c6f95277bf5346f955825d6e92f1c01d5eb7c274d1b08ff377e0db324fd7df76675fa38bf896d9c37b31578c4fa310483339fb01eda3175a51d6d70ab1006d5b9dac882484e43329039b833537ab96f4fb5234ee9e9de43405b087ffa", @ANYBLOB="00005f4fd6a38265c94693d07200c183ff46c93cba75f6d9713a590554d7b4d37fe2fbf0977667418013ee8b3bfd7deac1f7cde459e9ff29a8fd44247800d3ccb8a6cddf7223e02dc53a86a9e91f8f124639c4c2d4e1f71533f872341a8cf38605058ecf0bca01000000ea822e9a141d802c14fdf23da2495d0e3f4a0971dd24eabaa134949e5c77c17428f282a0bd2a68"]) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r3, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f00000016c0)={{0x1, 0x1, 0x18, r2, {0x1}}, 'mnt/encrypted_dir\x00'}) 01:11:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 12) 01:11:25 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r2 = openat(r0, &(0x7f0000000240)='./file1\x00', 0xa8003, 0x140) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0xa501, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x840, 0x0) copy_file_range(r3, &(0x7f0000000380)=0x1, r4, 0x0, 0x2, 0x0) mknodat$null(0xffffffffffffff9c, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x80, 0x103) r5 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r5, 0x0) io_uring_enter(r5, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat(r2, &(0x7f0000000280)='mnt/encrypted_dir\x00', 0x16000, 0x108) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_SPLICE={0x1e, 0x3, 0x0, @fd=r1, 0x6, {0x0, r0}, 0x90, 0x11, 0x0, {0x0, 0x0, r5}}, 0x3) 01:11:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x104079, &(0x7f0000000280)={'trans=virtio,', {[{@access_uid={'access', 0x3d, r0}}, {@loose}, {@loose}, {@fscache}], [{@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@audit}]}}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 998.147240] FAULT_INJECTION: forcing a failure. [ 998.147240] name failslab, interval 1, probability 0, space 0, times 0 [ 998.150435] CPU: 1 PID: 7494 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 998.152536] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 998.155057] Call Trace: [ 998.155888] dump_stack+0x107/0x167 [ 998.157031] should_fail.cold+0x5/0xa [ 998.158206] ? p9_fcall_init+0x97/0x290 [ 998.159433] should_failslab+0x5/0x20 [ 998.160611] __kmalloc+0x72/0x390 [ 998.161669] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 998.163257] p9_fcall_init+0x97/0x290 [ 998.164453] p9_client_prepare_req.part.0+0xf4/0xac0 [ 998.165862] p9_client_rpc+0x220/0x1370 [ 998.166890] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 998.168245] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 998.169640] ? pipe_poll+0x21b/0x800 [ 998.170598] ? p9_fd_close+0x4a0/0x4a0 [ 998.171607] ? wait_for_partner+0x3c0/0x3c0 [ 998.172724] ? p9_fd_poll+0x1e0/0x2c0 [ 998.173713] ? p9_fd_create+0x357/0x4a0 [ 998.174743] ? p9_conn_create+0x510/0x510 [ 998.175615] ? p9_client_create+0x798/0x1230 [ 998.176775] ? kfree+0xd7/0x340 [ 998.177624] ? do_raw_spin_unlock+0x4f/0x220 [ 998.178779] p9_client_create+0xa76/0x1230 [ 998.179880] ? p9_client_flush+0x430/0x430 [ 998.180973] ? trace_hardirqs_on+0x5b/0x180 [ 998.182078] ? lockdep_init_map_type+0x2c7/0x780 [ 998.183304] ? __raw_spin_lock_init+0x36/0x110 [ 998.184554] v9fs_session_init+0x1dd/0x1680 [ 998.184897] loop4: detected capacity change from 0 to 41948160 [ 998.185659] ? lock_release+0x680/0x680 [ 998.185689] ? kmem_cache_alloc_trace+0x151/0x320 [ 998.185712] ? v9fs_show_options+0x690/0x690 [ 998.190506] ? trace_hardirqs_on+0x5b/0x180 [ 998.191604] ? kasan_unpoison_shadow+0x33/0x50 [ 998.192770] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 998.194070] v9fs_mount+0x79/0x8f0 [ 998.194980] ? v9fs_write_inode+0x60/0x60 [ 998.196036] legacy_get_tree+0x105/0x220 [ 998.197086] vfs_get_tree+0x8e/0x300 [ 998.198036] path_mount+0x1490/0x21e0 [ 998.199021] ? strncpy_from_user+0x9e/0x470 [ 998.200114] ? finish_automount+0xa90/0xa90 [ 998.201236] ? getname_flags.part.0+0x1dd/0x4f0 [ 998.202432] ? _copy_from_user+0xfb/0x1b0 [ 998.203505] __x64_sys_mount+0x282/0x300 [ 998.204547] ? copy_mnt_ns+0xa00/0xa00 [ 998.205547] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 998.206884] ? syscall_enter_from_user_mode+0x1d/0x50 [ 998.208208] do_syscall_64+0x33/0x40 [ 998.209166] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 998.210482] RIP: 0033:0x7f42b2db2b19 [ 998.211435] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 998.216149] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 998.218105] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 998.219929] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 998.221762] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 998.223585] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 998.225396] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 01:11:25 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) syz_io_uring_complete(0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x88) openat(0xffffffffffffffff, &(0x7f0000000ac0)='./file1\x00', 0x82d01, 0x30) setsockopt$WPAN_SECURITY_LEVEL(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000240), 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46042e000000000000000000000000000000000000000000008000000040000000000000007003000000000000ff010000000038000200ffff00005afd070000000000000000000000000000003bdf00000000000005000000000000000000000000000000000000000000000000000000000000000000b245c7e800"/445], 0x278) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) io_uring_enter(r2, 0x58ab, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='mnt/encrypted_dir\x00', &(0x7f0000000200), 0x5400, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cachetag={'cachetag', 0x3d, '//{5'}}, {@posixacl}, {@access_any}, {@privport}, {@noextend}, {@cache_loose}, {@cachetag}, {@privport}], [{@appraise}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'vfat\x00'}}]}}) [ 998.273221] loop6: detected capacity change from 0 to 41948160 [ 998.287149] loop2: detected capacity change from 0 to 41948160 [ 998.298414] loop3: detected capacity change from 0 to 41948160 [ 998.306163] loop1: detected capacity change from 0 to 41948160 [ 998.320017] FAT-fs (loop3): Unrecognized mount option "./file1" or missing value [ 998.337896] loop3: detected capacity change from 0 to 135266304 [ 998.352017] FAT-fs (loop3): Unrecognized mount option "./file1" or missing value 01:11:25 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 39) [ 998.516693] FAULT_INJECTION: forcing a failure. [ 998.516693] name failslab, interval 1, probability 0, space 0, times 0 [ 998.519474] CPU: 0 PID: 7535 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 998.521070] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 998.522976] Call Trace: [ 998.523601] dump_stack+0x107/0x167 [ 998.524472] should_fail.cold+0x5/0xa [ 998.525347] ? create_object.isra.0+0x3a/0xa30 [ 998.526407] should_failslab+0x5/0x20 [ 998.527277] kmem_cache_alloc+0x5b/0x310 [ 998.528377] create_object.isra.0+0x3a/0xa30 [ 998.529412] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 998.530574] __kmalloc+0x16e/0x390 [ 998.531407] p9_fcall_init+0x97/0x290 [ 998.532277] p9_client_prepare_req.part.0+0xf4/0xac0 [ 998.533477] p9_client_rpc+0x220/0x1370 [ 998.534393] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 998.535609] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 998.536861] ? pipe_poll+0x21b/0x800 [ 998.537708] ? p9_fd_close+0x4a0/0x4a0 [ 998.538581] ? wait_for_partner+0x3c0/0x3c0 [ 998.539549] ? p9_fd_poll+0x1e0/0x2c0 [ 998.540426] ? p9_fd_create+0x357/0x4a0 [ 998.541319] ? p9_conn_create+0x510/0x510 [ 998.542451] ? p9_client_create+0x798/0x1230 [ 998.543708] ? kfree+0xd7/0x340 [ 998.544574] ? do_raw_spin_unlock+0x4f/0x220 [ 998.545599] p9_client_create+0xa76/0x1230 [ 998.546574] ? p9_client_flush+0x430/0x430 [ 998.547554] ? trace_hardirqs_on+0x5b/0x180 [ 998.548609] ? lockdep_init_map_type+0x2c7/0x780 [ 998.549675] ? __raw_spin_lock_init+0x36/0x110 [ 998.550704] v9fs_session_init+0x1dd/0x1680 [ 998.551679] ? lock_release+0x680/0x680 [ 998.552588] ? kmem_cache_alloc_trace+0x151/0x320 [ 998.553668] ? v9fs_show_options+0x690/0x690 [ 998.554669] ? trace_hardirqs_on+0x5b/0x180 [ 998.555640] ? kasan_unpoison_shadow+0x33/0x50 [ 998.556670] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 998.557819] v9fs_mount+0x79/0x8f0 [ 998.558617] ? v9fs_write_inode+0x60/0x60 [ 998.559543] legacy_get_tree+0x105/0x220 [ 998.560463] vfs_get_tree+0x8e/0x300 [ 998.561297] path_mount+0x1490/0x21e0 [ 998.562157] ? strncpy_from_user+0x9e/0x470 [ 998.563121] ? finish_automount+0xa90/0xa90 [ 998.564127] ? getname_flags.part.0+0x1dd/0x4f0 [ 998.565221] ? _copy_from_user+0xfb/0x1b0 [ 998.566176] __x64_sys_mount+0x282/0x300 [ 998.567102] ? copy_mnt_ns+0xa00/0xa00 [ 998.567998] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 998.569212] ? syscall_enter_from_user_mode+0x1d/0x50 [ 998.570398] do_syscall_64+0x33/0x40 [ 998.571234] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 998.572436] RIP: 0033:0x7f42b2db2b19 [ 998.573282] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 998.577504] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 998.579236] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 998.580927] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 998.582569] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 998.584202] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 998.585810] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 999.195364] syz-executor.7 (7523) used greatest stack depth: 23352 bytes left 01:11:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:11:40 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 40) 01:11:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x14, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0}, &(0x7f0000000540)=0xc) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000200)='mnt/encrypted_dir\x00', 0x1, 0x3, &(0x7f0000000440)=[{&(0x7f0000000240)="3e4f5123b6957e92dade6e8e5d60e0e07d28c8bc36ccef6d114f068555b901a7d041654f235948acb83398a510656b61b16fcf95ee35f725421639fa86e642c5d9d6f2139ceb53d33a4dc59cca80078dcbff695d1b50f851c44353596a1b881872ff682e3771f0a0777022b80bd23acc8fab20cfad8a9051da6fe286501b331b88f80a16f4a160315c1e40ab335b2c0bd2ceba61ecd392c207112e1a81979073a3e3", 0xa2, 0x74}, {&(0x7f0000000300), 0x0, 0x1}, {&(0x7f0000000340)="139b3615f1eb163b432b3da54f01ed0e179c56106c3c7e9807483d5baeb5b386f2795dc192f351ce29822d892045859625cc39c2f430ecd15a0519f4e6806a82ced814db43ada8f8572b41b680814d43b0c7b27210e92adb4d58a54b93e3c13709734beb161c6b5edf1569d80b2482226fda2f7e362eaa3f79bed578591aeaf1d9b6894737f27d54b6194d5fd339c7e67e842e6280590f05ffd08ae789246e68406eeda4451f75662b2b472b31f4fbd1aca1b914989bec2e566d9704461dd64db49af4cf84696ddad5aaf532287ce982494d", 0xd2, 0x3}], 0x32000, &(0x7f0000000580)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}, {@gid={'gid', 0x3d, 0xee01}}], [{@fowner_gt={'fowner>', r0}}, {@appraise_type}]}) 01:11:40 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000000)='./file0\x00') [ 1013.806453] FAULT_INJECTION: forcing a failure. [ 1013.806453] name failslab, interval 1, probability 0, space 0, times 0 [ 1013.808169] CPU: 1 PID: 7550 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 1013.809075] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1013.810164] Call Trace: [ 1013.810523] dump_stack+0x107/0x167 [ 1013.811007] should_fail.cold+0x5/0xa [ 1013.811518] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1013.812275] should_failslab+0x5/0x20 [ 1013.812796] kmem_cache_alloc+0x5b/0x310 [ 1013.813341] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1013.814087] idr_get_free+0x4b5/0x8f0 [ 1013.814617] idr_alloc_u32+0x170/0x2d0 [ 1013.815145] ? __fprop_inc_percpu_max+0x130/0x130 [ 1013.815799] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 1013.816516] ? lock_release+0x680/0x680 [ 1013.816989] idr_alloc+0xc2/0x130 [ 1013.817361] ? idr_alloc_u32+0x2d0/0x2d0 [ 1013.817793] ? rwlock_bug.part.0+0x90/0x90 [ 1013.818253] p9_client_prepare_req.part.0+0x612/0xac0 [ 1013.818807] p9_client_rpc+0x220/0x1370 [ 1013.819230] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1013.819800] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1013.820371] ? pipe_poll+0x21b/0x800 [ 1013.820775] ? p9_fd_close+0x4a0/0x4a0 [ 1013.821190] ? wait_for_partner+0x3c0/0x3c0 [ 1013.821894] ? p9_fd_poll+0x1e0/0x2c0 [ 1013.822425] ? p9_fd_create+0x357/0x4a0 [ 1013.822877] ? p9_conn_create+0x510/0x510 [ 1013.823319] ? p9_client_create+0x798/0x1230 [ 1013.823788] ? kfree+0xd7/0x340 [ 1013.824137] ? do_raw_spin_unlock+0x4f/0x220 [ 1013.824623] p9_client_create+0xa76/0x1230 [ 1013.825081] ? p9_client_flush+0x430/0x430 [ 1013.825534] ? trace_hardirqs_on+0x5b/0x180 [ 1013.825997] ? lockdep_init_map_type+0x2c7/0x780 [ 1013.826502] ? __raw_spin_lock_init+0x36/0x110 [ 1013.826994] v9fs_session_init+0x1dd/0x1680 [ 1013.827454] ? lock_release+0x680/0x680 [ 1013.827882] ? kmem_cache_alloc_trace+0x151/0x320 [ 1013.828395] ? v9fs_show_options+0x690/0x690 [ 1013.828878] ? trace_hardirqs_on+0x5b/0x180 [ 1013.829336] ? kasan_unpoison_shadow+0x33/0x50 [ 1013.829820] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1013.830362] v9fs_mount+0x79/0x8f0 [ 1013.830829] ? v9fs_write_inode+0x60/0x60 01:11:40 executing program 4: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd_index}, 0x8001) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x7e6}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[@ANYRES64=r2, @ANYRESOCT=r0]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:11:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x40000802) mkdir(&(0x7f0000000000)='mnt/encrypted_dir\x00', 0x30) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1013.831328] legacy_get_tree+0x105/0x220 [ 1013.831879] vfs_get_tree+0x8e/0x300 [ 1013.832317] path_mount+0x1490/0x21e0 [ 1013.832740] ? strncpy_from_user+0x9e/0x470 [ 1013.833232] ? finish_automount+0xa90/0xa90 [ 1013.833696] ? getname_flags.part.0+0x1dd/0x4f0 [ 1013.834222] ? _copy_from_user+0xfb/0x1b0 [ 1013.834674] __x64_sys_mount+0x282/0x300 [ 1013.835105] ? copy_mnt_ns+0xa00/0xa00 [ 1013.835550] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1013.836113] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1013.836730] do_syscall_64+0x33/0x40 [ 1013.837131] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1013.837714] RIP: 0033:0x7f42b2db2b19 [ 1013.838117] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1013.840215] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1013.841236] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 1013.842481] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1013.843591] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 1013.844663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1013.845715] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 1013.855805] loop6: detected capacity change from 0 to 41948160 [ 1013.860992] loop3: detected capacity change from 0 to 41948160 [ 1013.870098] loop4: detected capacity change from 0 to 41948160 [ 1013.873918] loop2: detected capacity change from 0 to 41948160 sendmmsg$sock(0xffffffffffffffff, &(0x7f0000005700)=[{{&(0x7f0000000240)=@pptp={0x18, 0x2, {0x3, @loopback}}, 0x80, &(0x7f00000016c0)=[{&(0x7f00000002c0)="31959b8cef53be828ab3848f30c607ca24ca18ef3a6130030cff970fb958050c3639814f535be780737b70ced7a53eddb6fb83137290f9e52f039e1ff9ac653a35cba1bdc47df3e510b1026374151bbcd2c4b94a42eef50cd512870228457fa5f97f1536a3d884ab08d60348f548d867b84fa1857c733109990ad0251cbd4a059238b7156a498dcea35e0f3fea6d1ec4417cf0ec293b5b5fcbb25f02d26f50200836b9f0c36a01757b393d2b4829bb82033b6f79661dc321bdb20235411d6c5a2e4dd9bb1a2283d3cbaa798f29366211e21a883ee7e20b91de765c2a0678c876754ba17efcdf63848c92704e2d67cfd4c32ef1b3", 0xf4}, {&(0x7f00000003c0)="86384a0724a01ce8664b6fb4ca85ad", 0xf}, {&(0x7f0000000400)="aaa1c54c5065b1f1cecdd128208d3ac57e740389268e62aa247e127d15be7bc841676f964cbfb2fbf311eb81fa43c0a16b50191bd4cd3794187845d927e46438b4941b5d5a0187b94eaaa188", 0x4c}, {&(0x7f0000000500)="17f67c3511b77910053289e7ef75f5fa92bc051b253952f54d9a498b885cefbf2eaa24c269c7bbb239847e848c866b4138c12e0015d981227f7e6a815dbbd755929c01dc7277025585eb16ecdeaf3529d78f37229aa9194bf7e2c43099c4aff5416200f90e384b941673b87b6c7480d2b7fe3d4b5d4f999541ca5b70f08b171e47fa82755d51d172", 0x88}, {&(0x7f00000005c0)="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", 0x1000}, {&(0x7f0000000480)="43e1e56b645e31c6626dd48b17e01f23f7cb9acf4a3e3ef0492f156705e2dc9c72fa5bf9ac16820de5b76a645ca9", 0x2e}, {&(0x7f00000015c0)="a226138128ac5632847363e73f18dc30a9f6cfc43dbedc2e75a6c30b34ed01c7cabc612c196df2a0d1f0030153ec7d5f3bb43da53a3003378bf07352059c57f3f72349046b9e0419b20a8a3ed0671ad78fbd620cb9c7fc1a5ebe845c86f206383d0ad3202cf7660d95679987e53f87070942d1c8615a3768432a27eb2a8fc028e4ec9787daf11b59f11f930ea8450f385c65df42c08b07b98682eaad85c67a68a03543de4ccbabd22cd9491ad63a3fcaca92339de4685a2c31afdaa30a487288a697a5f4f83e67c9d89cee6228f7f25befc94ab914", 0xd5}], 0x7, &(0x7f0000001740)=[@mark={{0x14, 0x1, 0x24, 0x7fffffff}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffffa}}, @txtime={{0x18, 0x1, 0x3d, 0x10000}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x10001}}, @timestamping={{0x14, 0x1, 0x25, 0x8000}}, @mark={{0x14, 0x1, 0x24, 0xa2}}], 0xc0}}, {{&(0x7f0000001800)=@l2tp6={0xa, 0x0, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}, 0x80, &(0x7f0000002a80)=[{&(0x7f0000001880)="deb7ff06a7f6ef21a6affd26c349ec9accae613d220a05341b80d0e6e94d44a537f7a0ee32b339d5517cab0b94c2f4704b1df021096e520c613cee34f865", 0x3e}, {&(0x7f00000018c0)="693e1b45c49e135b9a551a244969f1729858d2d2a26ce6766c46c286abb71c6c4881eda016b6ae5bf7d37f7bc512420c01f4e4131d6654e810faad7dc61a74970e78bbefe1474ab3f771a63c9da567ffe697e3dd0ba925f976c2bf2365191078755ea649fbe19ca7ab91e7122a5a28bf3b19b6aeca1339f65904df9c75df4667087746edb2bf00c98c789d1dbc3bd989bc20b469554e8e9af1f00a97047a9a479d5aca6e22f48ebb3570ec26e071eeb14c95e3388db387ee76dab94a59", 0xbd}, {&(0x7f0000001980)="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", 0x1000}, {&(0x7f0000002980)="1af3e02b9535e91695df56b4c3826964c7b9faaf6a07ae4cd0715c5ad7adcf19501d6299693bf9a26bb3168085b9b3cb61e1a8c7996168e1d7a3ffb019a57d4bff6fc2139f7881a130c79ef7394e54be56e172c2be15ae3d76dffb4a6287e3e7733a860a677b9d091855f1f0d940874e6022a625670db743bf3678941866464a09f9d44ceed172bcbe0fa6b977873fadcab1f53d154be21db68d87e41afb2b790fbf1e4417e0929a7abb97d806a378e52332faa7e1e90dd9a7d5b6832b0a948a13a962cb7a103b7f", 0xc8}], 0x4, &(0x7f0000002ac0)=[@txtime={{0x18, 0x1, 0x3d, 0xaab}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x7f}}, @timestamping={{0x14, 0x1, 0x25, 0x8001}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x80}}, @txtime={{0x18, 0x1, 0x3d, 0x1000}}, @mark={{0x14, 0x1, 0x24, 0xffffffff}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}], 0xf0}}, {{&(0x7f0000002bc0)=@rxrpc=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e23, 0x80000001, @private1}}, 0x80, &(0x7f0000003100)=[{&(0x7f0000002c40)="05546a9e45ea1d05b7b3b02b28ce1f9f5db5f02f252b71c70e2fad8652bdf328a39055736c0f2b", 0x27}, {&(0x7f0000002c80)="1c59ad54fd519ce8643029f734a8c79647fdb50b05aec96384a39ee50256516d0b5fa3f93b5420da605684e7b65213685cd941087434ea9c15a20b70938ce2ab472dfd72d63f3ee11b56c283d1e8c2cc8307b07a792ac5feda9757b2e73f185dab65c721fd76895c720a1b02c0c988a1f55063b3e61a2ce3", 0x78}, {&(0x7f0000002d00)="d2822c01e8dfb8459fb6e73b968cc7fa6b0b60fe0376c7e72f912387da91d8203224e75cc3070f0c5bc4f63fe1b2d2285ffd86be050410b57c49ce6be5fcf55a31", 0x41}, {&(0x7f0000002d80)="af8bc1e3fcac8d4be3c59b373149f99c7d5db2e329af3669fab58fe52cc67ba7375d129a17a03cee22080b6542f8bf918d5806eb4ca28d77ec90d1f501e054cd7725999795850d1c83bbeaa95526c1ec6c2ce0dc16b8c50b9697ce38d843041924f01eab852456cb2cfceede97886e0968ed911956c49c35c8a2fab8ecc98df61218767fbf5473a4acb0b51a8c", 0x8d}, {&(0x7f0000002e40)="81a2817c51312c21b0a3da6c70c048c8be17e58e9462ed654b094213f4bcff950a4e84a64e705e982f81da18d3457f0001360db7aafeef13012f5d06b48e403ca7a15740844d819830d4a213dd88c1ee85e791", 0x53}, {&(0x7f0000002ec0)="a0e3a51fa8b9b2cc9fa2f39b0eb38540e828398994bb3639a55b7589301b4a065d78cdb0760596b0d14cff354660d64e98f10fb1148a9664c7bd82e19644f1bbfbbc3c15f2532d9c71c6a7d4da9349c42dee7fdfed8953cf308d10dbbb00dda1f419a08df8dc72075c904296e147a0461f7ddb3653722ae40dfa808603f17be26ab63134194f6aff60ec0248f4dbc8ac2aaa36ca41d8fb9d4021ba93156039f5215225f8c7252ab4d7", 0xa9}, {&(0x7f0000002f80)="6b3473e8f703fa201cc54699273c70da4fd57aa3cd1586e0cdd1a11888df10bccdf093422b51e9eea727164a0d6ca16af17ee1a39039f98506c1ce2659e75ddb77152bdfe88c29a33ace994071ec83d59fc916c48b62b4869625e5c54a8e718d980c3c3d6e9fbe3d765aa0f2e5fd4d596330b0fbca449b43a5967bffc24650c5ede401643240e602f24987c3b2b92cb87ae617bd892e7dd7", 0x98}, {&(0x7f0000003040)="f663ca3449c9c6d51543d64d1435257814f834ceb6e136583f030fa051074d87d98d36922190374aab0cda1595e72a8fe5940c1b047addf32d920243766d84bc24818a5732692ca0b24b646cc11a4616e6a7984914e30b7c049a4cb2423084d1bb2fcd7ac07f6202c66d0ee3f7edc9067f814fe23d3000b981047bbfe4c972ec0885936851b6668d3fae64ac5419a615a532add02e", 0x95}], 0x8, &(0x7f0000003180)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x810}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0xfff}}], 0xf0}}, {{&(0x7f0000003280)=@tipc=@nameseq={0x1e, 0x1, 0x2, {0x42, 0x5, 0x1}}, 0x80, &(0x7f0000004800)=[{&(0x7f0000003300)="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", 0xfa}, {&(0x7f0000003400)="67b5240d285a3d50e25531478d7fcc372a9f35e15d9ff474a976ca7da2d7a912a1e749b58230fa4c", 0x28}, {&(0x7f0000003440)="fa0a419944cf4f53e556764bd14919de16b7266b506ed9d8150446330d1a62418404813ecb873e497385c8aca73d4070e70adc7dd622408d1a5e4dbc497c0eb6b99c7960d796fa4c4d164d35b54d6f2b72bc9caf848d5bdbbc7b064d5a006cd3ba926b33ed535ce037db613a6c0b070fd1f6a283066245656f2bc860a178fed9dc42561f971418d8835a388398e3e4945d62a2b30bba6a4e0edb49d9d08733998a4687531382830bbd20cf88d39484ab73b4f63f6c1fe729b2fafe356cc14f23", 0xc0}, {&(0x7f0000003500)="7ecb8f0ce69b02568345670c422d05c0357a753a521cddcd2cc45b987ff1c963768ed8eb0a9a675bde8593602e8a2381bdbfc285bca1e231fa2cdd48fa5fba809570f3ff7c3b448683eb4752a8fb019834a02afdde5c8aad91783f74bb99beb877d6", 0x62}, {&(0x7f0000003580)="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", 0x1000}, {&(0x7f0000004580)="f19b6f8c441370b02257074e92f67108038a0835b23affc7535a9b9cd67c88385b0e29839e4460834da659df3b7218eba05fb2a3a1c4157081e0237d9f01c8465f3d71a3", 0x44}, {&(0x7f0000004600)="5d460f7558dbbc2b35f90117764b3feb626c5eba79c94e42b45575579c16e006e0a2a292d5de0604cb4939dbf3bbd93dfa0408ce902db46c7e87fc109519d4631a128319ecad0a41eb96f044f74134043049e31899b606a49e3e768785167f6a52b91a6e846b9efaae1d979d734a6db7f86264fe8f72ecc93b3045bd3c72573e6d1ec56706041b43b4223ac6fd31b2068a87e18338aab19046f11c1a0e6fcb1af2fd62ab1b1f78ad2cffbcc9245b9f7aa57f6d428614242d5d7baba76d4a1cf0b080", 0xc2}, {&(0x7f0000004700)="874de5aa0413b1733334cb461e46ed91d687ef0cbf38cd04e98d5c742652cd5b8c831742d27287771a1759579b32cc29ade5073f300ec9b3616a1eb88a2030cc870f39370006cd0979af3c40dd00828e69ef47ccc2293361709e4507c4f057a452e2c88fa7d5d33273cc55d692d435fd9ef91c669108bf9c141c230fccd5d57a213dff0a429a4cb0b299b86563e3147f464557eab17e6db9bca2b3655e454e521d1d243f8c25912f7880252e0454bd8afd34308f36b5d3260a4a4104239b342b9354098d405592d3b8c817eae0caccfea84ab2d8b1c758d3", 0xd8}], 0x8}}, {{&(0x7f0000004880)=@qipcrtr={0x2a, 0x1, 0x8000}, 0x80, &(0x7f0000004a40)=[{&(0x7f0000004900)="0ff6da336744e04b85207df1048a1fa1af85404532df36b25ef395c58d209eb627180973eeb44658de156da3758c4a7d2ec921a97e2198d009", 0x39}, {&(0x7f0000004940)="991d8c9db020f451b84df02d9ea77117100d9f9f811206f065e9858ac34413266727d437dcb56b4aeeff542ad27093111de9605e98e44f1584daf84a56ca5ee59c706599625f8c2d21db1a249ed0597177d450a37debb47170b7e5bcc643ab6060298da4f0f052757ce9835f48b43e459d75f7ff75d83bef3b727b50ecc8f5b9f9a70420c419bf17a15fd17ab4e3c1a8107e61c8d097299c9102ff79c911a98f004845460cf12b62df00d2918950ebaba71ce22a6df9b77908e93649c9f5be99087a8f43d2263f3473ff8aa68c38ed9608365fcb547d7b46d261f2fde22294c85ebb8281", 0xe4}], 0x2, &(0x7f0000004a80)=[@txtime={{0x18, 0x1, 0x3d, 0x84cf}}, @timestamping={{0x14, 0x1, 0x25, 0xfffff801}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x1f}}, @txtime={{0x18, 0x1, 0x3d, 0x40}}], 0x78}}, {{&(0x7f0000004b00)=@sco={0x1f, @none}, 0x80, &(0x7f0000004c00)=[{&(0x7f0000004b80)="14c9667af0ea68ccccb68ab31f0dc3991a14924700356bb15e4258d75427f58df297d3aa583d84e3c646e8307ea58576259c74e6b78324cf4873f8e4", 0x3c}, {&(0x7f0000004bc0)="bb18b1391ded9625477389d12bebd64a15625778f615cb90f60dcb7fe117c520bdda85b520846616beb7f5d9b6d500f7", 0x30}], 0x2, &(0x7f0000004c40)=[@timestamping={{0x14, 0x1, 0x25, 0xffffffff}}, @mark={{0x14, 0x1, 0x24, 0x10000}}, @mark={{0x14, 0x1, 0x24, 0xe257}}, @timestamping={{0x14, 0x1, 0x25, 0x10000}}, @timestamping={{0x14}}], 0x78}}, {{&(0x7f0000004cc0)=@x25, 0x80, &(0x7f00000052c0)=[{&(0x7f0000004d40)="6c4c9fdf0a152bd6019e456082450d8279fdbf5fd4e7c736af7a3cbce0ed8920795c51983e16cb1d6765172e6564201108787a02f128b3b6499f12a0bfa51c3adaa8073b895bbd89efe8cf35b66e86478dc757410b1a30ec7888fd506a2578dc1f5db8c32418f06dad5043c3ed1f80da8fa458a9b1ff106759d156d62c63a44e08cbfa4b44a5f3cb313f7fe00eff6d30687ca7de2c886eaa28595391655f48c72ef4473444ef2d49086866ff9694ace0817366a266bc95073c57812971acfedc3a7a4cdc03b95adeb65e349fb6becc306babdad9dff3f4f928dba156384eba500ceb", 0xe2}, {&(0x7f0000004e40)="9408d805c6d6bdd911289c4adfed158e8d48a9fa8e09c509d3df5177057f7b692fd42ee90ee739c849026e57e835233e53ca6a1c9e133d60f71e4972b46f3aafc1b0bcefa92241dca40648381abc2313f3fa8dc678e479f735fb49ae997a7a7cbb395d454ae757e7cc97489db9a8dacd12aca8359705b25f24683dc196b18d8ad410ef8580038c943d4cb811935d4369b050de04b587a28f419dfb2061064aa79422a42fb78dd9573112b9013bc716b33cc223d24e0b0d9d8a8e8d3df7af1047c02c81497ed56a64c4114a9389", 0xcd}, {&(0x7f0000004f40)="3213b17fb91c768896f0e9f54adae092502461d4f3e234487e7097f64f0c93dd38240c3df9b70bf4deb45a23037e84321d78d8c06ec4d1d5ddd33075a960668f51b9d82178bfba48c541e3b5fb180a0224b2901d835f35b0df1df4b4cf7e759035bfca3bb58dc9508e6abf48dd9e56a7a46a88211278c91261ef85ee5137ae7829e1d92246e9d109ecc0c45a3284ab9b637b10c23bde396c943c90114446e40afe43e71bf16e406903ae03943c98b3eff8e9ad467bf887f76da6e13b81f5", 0xbe}, {&(0x7f0000005000)="0abf69c23de37a1d5ec615632c9c5935ceb8431ce4ec06af53a5749a64f7735a4a6b4342584c7f746cec610877507170c6b20ca283c27c24d11c549538ba2b78aca40946ce3f90dda131a84c4c28c7af9fc0", 0x52}, {&(0x7f0000005080)="0a950970808d4df48be0a3b87d322bc90e98edcc7863f19a5139d004564bbcdac60a620e1cd7cae1aa0ca0c8a03114002a301da40225bcdea456bc9ac1418777554ff5a5c2571c9e7fc7982cefe89eadd1e1afbb576e00ab812feb137629705544881dbed56a22b67e499c9e9263c368b117ccb1fc716e2904428101", 0x7c}, {&(0x7f0000005100)="03c2e232890aa447481238e40d759ecc01e70d4be6b49691bfb013df2d2df5032b37896b7106ecca5fd707ba63054c5ab8597f15b71896abbca546250ffa698c031a88816696e1d2863f8f53c295302895db2202f8013eef14e0b2adb790b62b9a3f1916bd09a50ae244631e18fb491254e2e6e56293b20623c38f3b6732250dd3627ddc96b3c5058fb6d9178da47689650b4b320490e193989b200248e735bf042140aaa6ceb42b074d8efbf4d6a457c9775099ef4c1486db296b3921111e067e64ee4168388c286b9cd7696e1a7b5efd00eb3fdf9a0d31fd30cfebf900e2cad3f6505246b2a67b9388ba54f7506fe07b4a223c77e1d8e9", 0xf8}, {&(0x7f0000005200)="c1745f0127943d8eebfd27a5d1d4b856fb5a235f5fb34c8724163f06bd524b37eb752af9fe01b1c62a409a83150650e5d3a968e283cd7bc5f32bb9e38a20077c71428417c423caba6f9ba56acd5935cf28ff3141525d0d074845c0c9657d22a20b6485d10e6102705e920a4584d31fdff694d382256b0342c71951463ebed23d4ccb5f77429a4b508cc69d15a88c981699fad1f463f04d80dba3ab", 0x9b}], 0x7}}, {{&(0x7f0000005340)=@caif=@util={0x25, "c05b756cbb9fd8792b468b0bf66b6e8c"}, 0x80, &(0x7f0000005540)=[{&(0x7f00000053c0)="ad9708d62b7c79bd54ad01792719469b22b544e14c4006a117de2b58ed460f4290731084d951324b762a6fdcf76893095cc06ce802bdddd487692c2babd96ce31dcbaaa341cdcc59beaa420d4aa686ac31594eacb994b4896462a5730152c55a33ed22e383762a75f0bd9baad7b402422de76d5ba43c1ae363da5dc9a6cfe3608182af9a2e96363bf84ad3d837c8559884c895dc9a08", 0x96}, {&(0x7f0000005480)="03a6487f763b976b6b0d1493d29cb6d00f9f2a4414403f9053ea", 0x1a}, {&(0x7f00000054c0)="b607af800252d2f56f4e5612299b0534e6fe0d248ad6ad5cf56fb3ce061ca516c58ca05218b92f9b196107a55d48d14ed2be2594645df77d78cee672847d9c30313dae3dfff95636986eb4a0166840273db8aefb24b7c4cd269953b63d13b970df97d650f713cd0aff2bfdb5684a0410cf41094904392b50", 0x78}], 0x3, &(0x7f0000005580)=[@mark={{0x14, 0x1, 0x24, 0x3ff}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x91}}], 0x48}}, {{0x0, 0x0, &(0x7f0000005680)=[{&(0x7f0000005600)="9fec30cd19168aeb7fd5ab8f5bc74e954e9ad6c1f6209c7d6dd587e2ffedab7581abf2664007c26c7a4b4f204e94e30b38f9a8d8a04221c7f49f58d50b06dc64bc289d9d2035a734292a2db7518b3249b9b35481ea921065a17e8383a42c187904ceddbd0426959211dee84c289811", 0x6f}], 0x1, &(0x7f00000056c0)=[@txtime={{0x18, 0x1, 0x3d, 0x10001}}], 0x18}}], 0x9, 0x80) 01:11:40 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) stat(&(0x7f0000000200)='./mnt\x00', &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r2, 0x0) r3 = syz_mount_image$nfs4(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0x3f, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000340)="60251a5f2faa6e7782ae37669f9a75bcd7c7f6b23e4e5bf651d478bbd37ba7138b16e3f21320254b0be8025f7e75e4f21cfb6b7d1c1e8d1b15fa4d3a361a9d86d14f32cb9bbd0926e534f75b1396cdb32816c1f173e6978cc661ba234cf2866dc53daa3b4796c24f18a3fa14da0ef5f3594798092233bc05548320d89af390f2b3835b25834a1272c73e6eae063cdd0c19c82ba1190b4fa240703f76845ca1cbd0deb0eb2c295afcc5c0771e71af811d7b651013662151cf5dd7849975b5838ac8659ec692c05f846f1c596d5985f48244dcc021330a4cb5c9751c80a2", 0xdd, 0x9b1}, {&(0x7f0000000440)="b4d2b56df913926e75e2c8c9283f1eb93990c5eb0bb787ed9c3e4a9b478032e9bec7c253c39ab7767eabb19e38a10cd72a9b7e09ddd2d1c0a4b1a692cca9e00d79d4ee0fdecb6f202fe37a21cec0f59f08f60c5f11830d1f532c8e531c8798988c32a61e57fb", 0x66, 0x8}, {&(0x7f0000000500)="c159c5e07ceacb35227fb248bfaf802fca766c36c9ce0de6cb61f0997a1f2cccf5bf67", 0x23, 0x9}, {&(0x7f0000000540)='M', 0x1, 0xf15}, {&(0x7f0000000580)="67a85c85a5dab0ae3bd98036cdea4d7ec0947bc49788223bc2e4827a47545eebd88e02dd9921d6ea662be4d8795777666fbd9346886398c2efc273f38c61ffb7e75da3b5b0ea7ca0547bc6d815543ebd35faf1a81f641455f7003c7cd8e6f1f41f05b91011baf2370ca957400a731e", 0x6f, 0x1ff}, {&(0x7f0000000600)="f12be074ad9b3d28444198106eaf1d5b8e552144a5eb8ad5c92e0b63dc1daa6e", 0x20, 0x1f}, {&(0x7f0000000640)="709fdd4914e16117e573a83bfd8541b64356b9990154fa0bff75080a109db3749b67ab8ff4993157fdfcd3f50f8c931e2c24fa13a8ea59c5566dce30d1478fb4506ad0973b8a10b662be7e266cbd0b428ae06272757bb05e113fed1a0b72b9d5b03deffef3695f89b1c7bb614e3a98bda2df76232cac00e006753d3ff3cf81751ca812924bb139fdb4586811d41bbfa6fcdbf46306e61494a2727a9bc96f1a608397", 0xa2, 0x3369}, {&(0x7f0000000700)="b582d8c0f79746a29dfffb7aff11eb881b7c2ce4012d862b7ddc80981948cb7b276134958916b1dc8ad0e7f7d5819b0738df06700db7eca8a4c830049102c57df915adddb74e94f97883fa55e8e2a3295ba62f378891585e61872fb86e4e0369ea1e232213c4a231b698bfe514470eefcf3bafb056e8280fe41dc3333e93c144a0629e7f52ee982c32e3cd9e7e2fbdb4d7", 0x91, 0xa3a}, {&(0x7f00000007c0)="fdf77aa55b6dc69892233c903bed30a2830b9e8c9f40ac1a20555083a258f5d12cd2348d23017f19e6344b0f521ff7b3a6385f53ed81e1b6149dab0057d6a33e04c8cf031f70ba4dab3e27c5db0b60b92d7fced5489ee9cc8dc83ce5fd810540619831e16c9dc0d9da9e98efa09af18af8cc18cc4d011d2b34459d72f651d8d97cb0ccfb3906db11a7a898b5a86740c10313619d2967fff03773223888c6f0fbccd04fd8126da79d9ab6951b846b948ba3f81e63c534e172519367381099cdffc02dfd36e2e790a020dfa7f66cb359876b344734f55e0923dd32247f9469c24216261fbb2d7f21d6b61ae1118b2fd548a4a7ec2fff6de5", 0xf7, 0xe475}], 0x2000000, &(0x7f00000009c0)={[{'vfat\x00'}, {}, {'vfat\x00'}, {'vfat\x00'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise}, {@fowner_lt={'fowner<', r1}}]}) write$cgroup_devices(r2, &(0x7f0000000e40)={'a', ' *:* ', 'rm\x00'}, 0x9) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="3b7e40cfbf55e1208481906a4a08209d57da3d8856f5efade3ba1b30c6a1446896d29b0000"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r4, 0x0) ioctl$TIOCGPKT(r4, 0x80045438, &(0x7f0000001040)) r5 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000240), 0x14c42, 0x0) sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f0000000bc0)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b40)={0x20, 0x0, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0xc, 0x4, [0x10000, 0x5]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x24004800) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f0000000c00)={0x134, 0xf8, 0x4, 0x3, 0x9, [{0x1ff, 0x3, 0x5, '\x00', 0x208b}, {0x80, 0x4, 0x6, '\x00', 0x2}, {0x9d60, 0x100, 0x5, '\x00', 0xc00}, {0x9, 0x1000, 0x3, '\x00', 0x2201}, {0x4e, 0x1, 0x401, '\x00', 0x80}, {0x9, 0x10001, 0x7, '\x00', 0xc0c}, {0x969e, 0x100, 0x9, '\x00', 0x882}, {0xfff, 0x5, 0x4, '\x00', 0x2000}, {0x0, 0x29af, 0x9, '\x00', 0x1000}]}) sendmsg$IPSET_CMD_TEST(r2, &(0x7f0000001000)={&(0x7f0000000e80)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000ec0)={0xc8, 0xb, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IPSET_ATTR_DATA={0x40, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x101}, @IPSET_ATTR_COMMENT={0x7, 0x1a, 'rm\x00'}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e24}, @IPSET_ATTR_PROTO={0x5, 0x7, 0xc}, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x8}, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x7ff}, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz2\x00'}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x6479}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_ADT={0x58, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PROTO={0x5, 0x7, 0x29}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x9}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x4}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARK={0x8}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz1\x00'}}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x7}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) renameat(r2, &(0x7f0000000280)='mnt/encrypted_dir\x00', r3, &(0x7f0000000a40)='./file0\x00') 01:11:40 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) syz_io_uring_complete(0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x88) openat(0xffffffffffffffff, &(0x7f0000000ac0)='./file1\x00', 0x82d01, 0x30) setsockopt$WPAN_SECURITY_LEVEL(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000240), 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46042e000000000000000000000000000000000000000000008000000040000000000000007003000000000000ff010000000038000200ffff00005afd070000000000000000000000000000003bdf00000000000005000000000000000000000000000000000000000000000000000000000000000000b245c7e800"/445], 0x278) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) io_uring_enter(r2, 0x58ab, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='mnt/encrypted_dir\x00', &(0x7f0000000200), 0x5400, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cachetag={'cachetag', 0x3d, '//{5'}}, {@posixacl}, {@access_any}, {@privport}, {@noextend}, {@cache_loose}, {@cachetag}, {@privport}], [{@appraise}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'vfat\x00'}}]}}) [ 1013.892153] loop5: detected capacity change from 0 to 41948160 [ 1013.897527] loop1: detected capacity change from 0 to 41948160 [ 1013.906550] FAT-fs (loop4): bogus number of reserved sectors [ 1013.908100] FAT-fs (loop4): Can't find a valid FAT filesystem 01:11:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000000)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:11:40 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 41) 01:11:40 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee01, 0xffffffffffffffff}}, './file1\x00'}) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000200)={0x4, 0x2, 0x34b6, 0xffff, 0x7f, 0x69e9}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:11:40 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./mnt\x00', 0x4ed7, 0x5, &(0x7f0000000400)=[{&(0x7f0000000080), 0x0, 0x3}, {&(0x7f0000000200)="14a73ceafbbed33ca1340e0d5b58a7f601bee69b3b6007344d817d4a23c810edb3a5fd7cd18bad2c6336c739ad195a8cf19bcb11d69d26693cdb3d682979d09f8f835a29b8fd7ad21aa9dcfc6faebe539e8718e88a8d94494ea8992df9b363c7ae93c2ab51244db075500e76b31c5d18d6e15fb9158d8416ccd7cd6ef101a8d17ad3f1539c826bc5be53e830623ce2fc028eb0f75c36a9936f098f680109813d0052d76af8fa1110357556045adb2e1ceb5f115a12370d088ebded0620a2173814", 0xc1, 0x4}, {&(0x7f0000000140)="55ad9f46b3e0d4c94cc42affe37540137cdaa321d137e53d1c", 0x19, 0x2}, {&(0x7f0000000300)="047c4f3fd6f9c1a6b12f4a4c9aa750ad3a74", 0x12, 0xfffffffffffffffd}, {&(0x7f0000000340)="fd3dbdee0a5d811acafb451515ffb04e62b1c683bda486e003caa6fd092a5aeccf225f1459d8572aa71837c4bcbac1a39296184e7e7bf0f6d4c77b61324ee39c5fa95b4bfea03835e5a248b7111301f65ae93a291019a33233071d72f4b5f0590fc8464245735f5efa1f4db67eeba67b1b31bb23006c64dc80b3485bce3e2b63cae5cf8d5fd010f9beb5ed8015b2e905e2c6cc44e05f4c2a331603f0eaa48d31953a16", 0xa3, 0x8e7}], 0x2800018, &(0x7f0000000480)=ANY=[@ANYRESDEC, @ANYRES64=0x0, @ANYRES16=0x0]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40df9f"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000005c0)=0xc) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000700)={{0x1, 0x1, 0x18, r0, {r2, 0xee01}}, './file0\x00'}) chdir(&(0x7f0000000040)='./file0\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000640)=0x14, 0x800) sendto(0xffffffffffffffff, &(0x7f0000000500)="d4ef7b1d77390240bef16d8c724568b87c2663c45cbe30a3c1c08bd20c52aecdcf3ed369273e424ba7583f275306e8aaef25d6cee2795b5fac66609be470a60bab1353425e37a5da64bf6434ee9f68fc41e9dd088a60e6fb53c901d1316e4bfe5024cde773e858cef12951780e427985a37ca419a3d357f43a6a645d5f4dfdfcb52e26", 0x83, 0x20000800, &(0x7f0000000680)=@can={0x1d, r3}, 0x80) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1014.000643] FAULT_INJECTION: forcing a failure. [ 1014.000643] name failslab, interval 1, probability 0, space 0, times 0 [ 1014.001852] CPU: 1 PID: 7575 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 1014.002579] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1014.003515] Call Trace: [ 1014.003806] dump_stack+0x107/0x167 [ 1014.004198] should_fail.cold+0x5/0xa [ 1014.004619] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1014.005233] should_failslab+0x5/0x20 [ 1014.005693] kmem_cache_alloc+0x5b/0x310 [ 1014.006244] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1014.006845] idr_get_free+0x4b5/0x8f0 [ 1014.007276] idr_alloc_u32+0x170/0x2d0 [ 1014.007786] ? __fprop_inc_percpu_max+0x130/0x130 [ 1014.008423] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 1014.009095] ? lock_release+0x680/0x680 [ 1014.009522] idr_alloc+0xc2/0x130 [ 1014.009913] ? idr_alloc_u32+0x2d0/0x2d0 [ 1014.010348] ? rwlock_bug.part.0+0x90/0x90 [ 1014.010839] p9_client_prepare_req.part.0+0x612/0xac0 [ 1014.011398] p9_client_rpc+0x220/0x1370 [ 1014.011822] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1014.012430] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1014.013018] ? pipe_poll+0x21b/0x800 [ 1014.013439] ? p9_fd_close+0x4a0/0x4a0 [ 1014.013858] ? wait_for_partner+0x3c0/0x3c0 [ 1014.014317] ? p9_fd_poll+0x1e0/0x2c0 [ 1014.014756] ? p9_fd_create+0x357/0x4a0 [ 1014.015180] ? p9_conn_create+0x510/0x510 [ 1014.015631] ? p9_client_create+0x798/0x1230 [ 1014.016131] ? kfree+0xd7/0x340 [ 1014.016488] ? do_raw_spin_unlock+0x4f/0x220 [ 1014.017008] p9_client_create+0xa76/0x1230 [ 1014.017468] ? p9_client_flush+0x430/0x430 [ 1014.017922] ? trace_hardirqs_on+0x5b/0x180 [ 1014.018386] ? lockdep_init_map_type+0x2c7/0x780 [ 1014.018893] ? __raw_spin_lock_init+0x36/0x110 [ 1014.019386] v9fs_session_init+0x1dd/0x1680 [ 1014.019849] ? lock_release+0x680/0x680 [ 1014.020304] ? kmem_cache_alloc_trace+0x151/0x320 [ 1014.020828] ? v9fs_show_options+0x690/0x690 [ 1014.021334] ? trace_hardirqs_on+0x5b/0x180 [ 1014.021799] ? kasan_unpoison_shadow+0x33/0x50 [ 1014.022319] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1014.022863] v9fs_mount+0x79/0x8f0 [ 1014.023245] ? v9fs_write_inode+0x60/0x60 [ 1014.023713] legacy_get_tree+0x105/0x220 [ 1014.024154] vfs_get_tree+0x8e/0x300 [ 1014.024585] path_mount+0x1490/0x21e0 [ 1014.025011] ? strncpy_from_user+0x9e/0x470 [ 1014.025499] ? finish_automount+0xa90/0xa90 [ 1014.025964] ? getname_flags.part.0+0x1dd/0x4f0 [ 1014.026493] ? _copy_from_user+0xfb/0x1b0 [ 1014.026973] __x64_sys_mount+0x282/0x300 [ 1014.027434] ? copy_mnt_ns+0xa00/0xa00 [ 1014.027879] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1014.028450] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1014.029047] do_syscall_64+0x33/0x40 [ 1014.029451] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1014.030036] RIP: 0033:0x7f42b2db2b19 [ 1014.030441] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1014.032528] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1014.033355] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 1014.034117] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1014.034878] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 1014.035638] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1014.036399] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 1014.085146] loop4: detected capacity change from 0 to 41948160 [ 1014.090926] FAT-fs (loop4): bogus number of reserved sectors [ 1014.092390] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1014.103960] loop2: detected capacity change from 0 to 8388096 [ 1014.115534] loop6: detected capacity change from 0 to 41948160 [ 1014.143771] loop3: detected capacity change from 0 to 41948160 [ 1014.146523] FAT-fs (loop2): Unrecognized mount option "18446744073709551615" or missing value 01:11:41 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 42) [ 1014.251990] FAULT_INJECTION: forcing a failure. [ 1014.251990] name failslab, interval 1, probability 0, space 0, times 0 [ 1014.253237] CPU: 1 PID: 7593 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 1014.253965] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1014.254846] Call Trace: [ 1014.255137] dump_stack+0x107/0x167 [ 1014.255528] should_fail.cold+0x5/0xa [ 1014.255938] ? create_object.isra.0+0x3a/0xa30 [ 1014.256426] should_failslab+0x5/0x20 [ 1014.256876] kmem_cache_alloc+0x5b/0x310 [ 1014.257324] create_object.isra.0+0x3a/0xa30 [ 1014.257793] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1014.258376] kmem_cache_alloc+0x159/0x310 [ 1014.258833] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1014.259433] idr_get_free+0x4b5/0x8f0 [ 1014.259849] idr_alloc_u32+0x170/0x2d0 [ 1014.260270] ? __fprop_inc_percpu_max+0x130/0x130 [ 1014.260795] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 1014.261373] ? lock_release+0x680/0x680 [ 1014.261801] idr_alloc+0xc2/0x130 [ 1014.262173] ? idr_alloc_u32+0x2d0/0x2d0 [ 1014.262605] ? rwlock_bug.part.0+0x90/0x90 [ 1014.263099] p9_client_prepare_req.part.0+0x612/0xac0 [ 1014.263657] p9_client_rpc+0x220/0x1370 [ 1014.264082] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1014.264690] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1014.265267] ? pipe_poll+0x21b/0x800 [ 1014.265668] ? p9_fd_close+0x4a0/0x4a0 [ 1014.266114] ? wait_for_partner+0x3c0/0x3c0 [ 1014.266578] ? p9_fd_poll+0x1e0/0x2c0 [ 1014.267015] ? p9_fd_create+0x357/0x4a0 [ 1014.267443] ? p9_conn_create+0x510/0x510 [ 1014.267911] ? p9_client_create+0x798/0x1230 [ 1014.268393] ? kfree+0xd7/0x340 [ 1014.268774] ? do_raw_spin_unlock+0x4f/0x220 [ 1014.269252] p9_client_create+0xa76/0x1230 [ 1014.269712] ? p9_client_flush+0x430/0x430 [ 1014.270166] ? trace_hardirqs_on+0x5b/0x180 [ 1014.270627] ? lockdep_init_map_type+0x2c7/0x780 [ 1014.271166] ? __raw_spin_lock_init+0x36/0x110 [ 1014.271665] v9fs_session_init+0x1dd/0x1680 [ 1014.272154] ? lock_release+0x680/0x680 [ 1014.272598] ? kmem_cache_alloc_trace+0x151/0x320 [ 1014.273148] ? v9fs_show_options+0x690/0x690 [ 1014.273628] ? trace_hardirqs_on+0x5b/0x180 [ 1014.274091] ? kasan_unpoison_shadow+0x33/0x50 [ 1014.274578] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1014.275121] v9fs_mount+0x79/0x8f0 [ 1014.275535] ? v9fs_write_inode+0x60/0x60 [ 1014.275980] legacy_get_tree+0x105/0x220 [ 1014.276444] vfs_get_tree+0x8e/0x300 [ 1014.276855] path_mount+0x1490/0x21e0 [ 1014.277289] ? strncpy_from_user+0x9e/0x470 [ 1014.277753] ? finish_automount+0xa90/0xa90 [ 1014.278216] ? getname_flags.part.0+0x1dd/0x4f0 [ 1014.278713] ? _copy_from_user+0xfb/0x1b0 [ 1014.279161] __x64_sys_mount+0x282/0x300 [ 1014.279595] ? copy_mnt_ns+0xa00/0xa00 [ 1014.280013] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1014.280585] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1014.281174] do_syscall_64+0x33/0x40 [ 1014.281577] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1014.282125] RIP: 0033:0x7f42b2db2b19 [ 1014.282524] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1014.284480] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1014.285305] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 1014.286068] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1014.286828] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 1014.287589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1014.288348] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 01:11:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000000)='mnt/encrypted_dir\x00') r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x4, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file1\x00'}) recvmmsg(r1, &(0x7f00000053c0)=[{{&(0x7f0000000240)=@qipcrtr, 0x80, &(0x7f0000001700)=[{&(0x7f00000002c0)=""/243, 0xf3}, {&(0x7f00000003c0)=""/153, 0x99}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000480)=""/7, 0x7}, {&(0x7f0000001500)=""/122, 0x7a}, {&(0x7f0000001580)=""/132, 0x84}, {&(0x7f0000001640)=""/153, 0x99}], 0x7, &(0x7f0000001780)=""/160, 0xa0}, 0x7c}, {{&(0x7f0000001840)=@rc, 0x80, &(0x7f0000001ac0)=[{&(0x7f00000018c0)=""/214, 0xd6}, {&(0x7f00000019c0)=""/87, 0x57}, {&(0x7f0000001a40)=""/76, 0x4c}], 0x3, &(0x7f0000001b00)=""/243, 0xf3}, 0x8}, {{&(0x7f0000001c00)=@alg, 0x80, &(0x7f0000003c80)=[{&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f0000002c80)=""/4096, 0x1000}], 0x2, &(0x7f0000003cc0)=""/175, 0xaf}, 0x5}, {{&(0x7f0000003d80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000005000)=[{&(0x7f0000003e00)=""/180, 0xb4}, {&(0x7f0000003ec0)=""/4096, 0x1000}, {&(0x7f0000004ec0)=""/245, 0xf5}, {&(0x7f0000004fc0)=""/62, 0x3e}], 0x4, &(0x7f0000005040)=""/87, 0x57}, 0x3ff}, {{&(0x7f00000050c0)=@tipc, 0x80, &(0x7f0000005280)=[{&(0x7f0000005140)=""/51, 0x33}, {&(0x7f0000005180)=""/246, 0xf6}], 0x2, &(0x7f00000052c0)=""/204, 0xcc}, 0x2}], 0x5, 0x10000, &(0x7f0000005500)={0x77359400}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) openat2(0xffffffffffffffff, &(0x7f0000005540)='mnt/encrypted_dir\x00', &(0x7f0000005580)={0x80, 0xc1, 0x4}, 0x18) openat(0xffffffffffffffff, &(0x7f00000055c0)='./file1\x00', 0xc00, 0x0) uselib(&(0x7f0000000040)='mnt/encrypted_dir\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:11:41 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xb, 0x4000010, r0, 0x8000000) r3 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) syz_io_uring_submit(r6, r5, &(0x7f0000000100)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd_index}, 0x8001) syz_io_uring_submit(r2, r5, &(0x7f0000000b40)=@IORING_OP_WRITEV={0x2, 0x0, 0x6000, @fd_index=0x7, 0x5, &(0x7f0000000ac0)=[{&(0x7f0000000640)="0845ab7d6221b231f9dd2c1197a32e29bbd4817b6b173996b1048f3d3ceb0b8d435c2156d4260ff458505122a6d799b0d3ff70e31516e1b2fd71549d851a5d267e03f550ea889c7373adfe254a79e6c3a1caa35d89761067d525e67943450b6caa68e5ceb9ad21cdaf31b2aea64c2a8c2334b133d43fa8bd4434a793929d5ddc2b874eee52ecda0087f1", 0x8a}, {&(0x7f0000000480)="1e613c49aab3d3b1d97d4effb01f73f2b06d14e7f73c98808add914c906c6c83cab07230286199b97db26840f74dd0861323f29d0e", 0x35}, {&(0x7f0000000700)="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", 0xfb}, {&(0x7f0000000800)="9a13d45df94153126b13ba83998833e98a770e2fcd8ea3b3f481ffdabd6d0915f71d15d40a38aa2db691d4238435c09f2644db0d059f3e86dc951b11d48df0a3c7c46eff8acbd8a672e9a35e9f27c14729a957389c08874d047fec2a2b6c8c7529594e85b6327d7b89d669019ab6d280deb8eda84d5dafa5fbe24539dd7d5a06384c9403a9ef8c67976711e65b38a4e235839922aa930c58a354b51f2933be46fd5fddde764d20ac50ca91257abdbecb62f8662b9ea6041c8addb4bbe87bdd59fa8c37caf0604c1e6b3e193857d391e11a6add563dd9b057bbeb4ab2c2149ef9da0ee8a30f27bc", 0xe7}, {&(0x7f0000000900)="0e7d7e993cf872cc0289433766ca52e42e7129beed9a815d16d6dcc18b877bed8020cf470555bbd9bc91a22de8e6a5087197ae21d6223b77510eb7", 0x3b}, {&(0x7f0000000940)="e913e33c246820ddc6d19a", 0xb}, {&(0x7f0000000980)="581e2067ffe90a7b71591fb1226c59960cab09a7468d41fcef8a5c4576d7408219a92c850d96fbaea70543003aa8da6a024de4501c83d7383c9bbdf6ad1150cbbfb0b6d99498427badc4e609e8cd97a102871a6ddb4b390f06d8af3f32db8b63c43fc6ce2079ba38c193d765fa98df47ff7ef03763fbdb3789f0f5302e42906527a1d0d5727923b2d4c477db5277de8e0e8c8260c71e17999ebabb23684b62e3c4e7bb014ab1546584187b26cb4553fb8b7ded510d38c58bafdd23", 0xbb}, {&(0x7f0000000a40)="97abe0e203d9faf7bace901e2507b9a4fe2286587380894e2c2ce453c257f526d1d985f20803715441cd4c5a525f1a24ed5c63b9d3314c824157105c6e6b13cbcc31519633a4efb2d5be5176cee93face324c9f64124e655", 0x58}], 0x8, 0x2, 0x1, {0x1}}, 0x0) syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000200)='./file0\x00', 0x7, 0x4, &(0x7f0000000500)=[{&(0x7f0000000240)="58c5b9aa14dab7e04d201afac1ab9d9c5ff4e18a423b3b671983f2c20aead1265482d0cead5bf0cb77b2f5101cf375389a8dc8db3ac02e5c1b66e929b114c64d7b", 0x41, 0x5}, {&(0x7f00000002c0)="a292962d608d87c387d7c5dbd11dd0b7bfff6f96781948ae405766f16b399d76e61f1a23fda7398583df6ebeb6e93a773be6f4719344940a14ca6b45fa3ea14296afc9b441e4f873e20b2cc65825636c0f667a75affc8cb9a2fa40cb36838cdae7b1", 0x62, 0xff80}, {&(0x7f0000000340)="e2f76003e20b868c2d9fc89ddaf982fd54803723cb5dc06fdcd30355c0ec161653535f2778e9008154295645a07dbdb10203089d371df9aec8ba373cf636c11b3429316de728f165b64fe32b1d2320947aa87d2f0cb609bf876b87a95357d28bdead919cd4c8390174f1d3bc83bc98cba83f9fc918c647ce09d41d33573db5b40cab337be41fb1b7bb0a5235aff630ef077dcf0812", 0x95, 0x7fffffff}, {&(0x7f0000000400)="7a3a90e32ed5c8569a98b4874d251fb96162cd18d628b2f918449e1cf2d80c39c6a6fdfbcfa2a60215777fc328709a48d11dabc5a9dfa57114e7bbded04b6c6b196d2f45150d9121ee", 0x49, 0x6}], 0x2008080, &(0x7f0000000580)={[{'&/\xc5^'}, {'vfat\x00'}, {'vfat\x00'}, {'vfat\x00'}, {'\xeb'}, {'![:\\'}, {'vfat\x00'}, {}], [{@smackfsfloor={'smackfsfloor', 0x3d, '.@'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, 0xee01}}]}) 01:11:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1018418, 0x0) r1 = syz_mount_image$nfs(&(0x7f0000000240), &(0x7f0000000280)='./mnt\x00', 0x1, 0x3, &(0x7f0000000540)=[{&(0x7f0000000340)="9651f1b8bde4cfb992823c76343094c201d66241e619b4d20fb0ffd24eb880424904a8c32a1ebfdc64f2ae2b4a237ecd9e581beaf795eafb8ae42cbd8394c345c98e6b662f0082eced811406593e090bb876624d31b1a746de3f81d13bde758b7e06734f1361e8454f99d9", 0x6b, 0x7fff}, {&(0x7f00000003c0)="910cdb4c9f30d6bd207b254c90dc98e255b6588a662716b05093abc2fc64fdfeb3926d8322a06c590068ddd3e2b02c6046d4e4492200b4f53ae8bc4e2e23299a946d54bd1729c4aa2a908535971f181a10f3be3f1273fdcaa0c880875eaf358b6588a34839916a9bb4845bf0cf11cb9ded8115c97b05784f2e97f8a2b3c174f19818780eac10b36dbe5846873962769a3971c08fbead423df6d688cfaa7a72d761360344b0ccb69ae347fca48543b87edcf3caafe737722f0588e4c7ae26f0b2040d1f485c3f0add49415f161b005a46de531d953fec203fc18326d6f3", 0xdd, 0x8}, {&(0x7f0000000500), 0x0, 0x4}], 0x210000, &(0x7f00000005c0)={[{'^'}, {'\x00'}, {'!&!'}], [{@appraise_type}]}) mkdirat(r1, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x10d) r2 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) io_uring_enter(r2, 0x58ab, 0x0, 0x0, 0x0, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={{r2}, 0x0, 0x3}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1014.315986] loop1: detected capacity change from 0 to 41948160 [ 1014.342426] loop5: detected capacity change from 0 to 41948160 01:11:41 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0xc0, 0x4, 0x15}, 0x18) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1014.369519] loop4: detected capacity change from 0 to 41948160 [ 1014.478604] loop6: detected capacity change from 0 to 41948160 [ 1014.686219] syz-executor.7 (7556) used greatest stack depth: 23032 bytes left 01:11:56 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) syz_io_uring_complete(0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x88) openat(0xffffffffffffffff, &(0x7f0000000ac0)='./file1\x00', 0x82d01, 0x30) setsockopt$WPAN_SECURITY_LEVEL(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000240), 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46042e000000000000000000000000000000000000000000008000000040000000000000007003000000000000ff010000000038000200ffff00005afd070000000000000000000000000000003bdf00000000000005000000000000000000000000000000000000000000000000000000000000000000b245c7e800"/445], 0x278) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) io_uring_enter(r2, 0x58ab, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='mnt/encrypted_dir\x00', &(0x7f0000000200), 0x5400, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cachetag={'cachetag', 0x3d, '//{5'}}, {@posixacl}, {@access_any}, {@privport}, {@noextend}, {@cache_loose}, {@cachetag}, {@privport}], [{@appraise}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'vfat\x00'}}]}}) 01:11:56 executing program 2: ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f00000008c0)={@empty, 0x13}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000200)='mnt/encrypted_dir\x00', 0x5, 0x3, &(0x7f0000000380)=[{&(0x7f0000000240)="8b5efa757b7f52ce390e0590ecfbe9d06dc66adb35e79dd180bac6af8989c5b55733de73eb5385cc8cc3a4fcbe", 0x2d, 0x1}, {&(0x7f0000000280)="4784118eb2f21c461cff01181f111c44d5547f8e60d8bfaea24d58b3c94bce95472c75d70b96ba969fb8c2e5febc8993b4b62a3a6517e98429e9b203a6a488c10f5e31fe74a85091b85fb11e80241e3ed8c1104083e0c419731b2e43e401b8dd78ab74c33581929eaa4f27c720720d1b22345af1484094ba521212ce4eda7f5e84d83f7e62077232054f1db2a6", 0x8d, 0x40}, {&(0x7f0000000340)="dc22df0493df1769dd2d3c", 0xb}], 0x220080, &(0x7f0000000400)={[{'9'}, {'vfat\x00'}, {'#\\*'}, {'.\xce'}, {'vfat\x00'}]}) syz_mount_image$nfs4(&(0x7f0000000440), &(0x7f0000000480)='./mnt\x00', 0xba, 0x4, &(0x7f00000007c0)=[{&(0x7f0000000500)="c7865556a1063505f29872b238bb0aeaf017d76f4857273a896f69678df32d84be6a025f44a0fa15159649f95355a516c654d8cf5aa3368bb0ebc5ac764b2b944c945e7a208c58096f8c7def0ae8c9573daa44fef921d159b925e39824bec35bec665a9f7870cb421be198bb0174163c73799973a23d7cc06d11338b8a8bc5941aff6d5701fc29f5e18b1f05be9a22ee2352310e0902bd93c805587149c5419b3ff630744fa63624c618b53580e51a0013786b715a01f2eece212fc939839e5c181935", 0xc3, 0x20}, {&(0x7f0000000600)="f3c978529d4be228047c154040f46babdd1788d7d1dedf2e3d12bb996cacdfb60f1a9fcbf75943c11a76323bbb51f825e6fd27073197dc3a084b59162d7967edb288be5c8ee611283ef404911dddfc813997", 0x52, 0x401}, {&(0x7f0000000680)="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", 0xfb, 0x100000001}, {&(0x7f0000000780)="67c69df72cd33c4a621d40cab390497308b446df3a33", 0x16, 0x1}], 0x8400, &(0x7f0000000840)=ANY=[@ANYBLOB="2925252c2c2c736d61636b66737472616e636d7574653d722c6673757569643d3d633266303966642d369866662d383332652d616560612d351a3561346464352c7065726d69745f646972656374696f2c00"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:11:56 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000200)='mnt/encrypted_dir\x00') openat(r0, &(0x7f0000000000)='./mnt\x00', 0x101081, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syncfs(r0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1029.748549] loop5: detected capacity change from 0 to 41948160 01:11:56 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 43) 01:11:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) faccessat2(r1, &(0x7f0000000200)='./mnt\x00', 0x2, 0x1100) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:11:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:11:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='./mnt\x00', &(0x7f00000001c0)='./mnt\x00') 01:11:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x7be8, 0x10, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x0, 0xffffffffffffffff}}, './mnt\x00'}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1029.771177] loop6: detected capacity change from 0 to 41948160 [ 1029.774479] FAULT_INJECTION: forcing a failure. [ 1029.774479] name failslab, interval 1, probability 0, space 0, times 0 [ 1029.777672] CPU: 1 PID: 7630 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 1029.779256] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1029.781185] Call Trace: [ 1029.781815] dump_stack+0x107/0x167 [ 1029.782673] should_fail.cold+0x5/0xa [ 1029.783568] ? create_object.isra.0+0x3a/0xa30 [ 1029.784639] should_failslab+0x5/0x20 [ 1029.785541] kmem_cache_alloc+0x5b/0x310 [ 1029.786505] create_object.isra.0+0x3a/0xa30 [ 1029.787375] loop1: detected capacity change from 0 to 41948160 [ 1029.787532] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1029.789953] kmem_cache_alloc+0x159/0x310 [ 1029.790934] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1029.792260] idr_get_free+0x4b5/0x8f0 [ 1029.793183] idr_alloc_u32+0x170/0x2d0 [ 1029.794099] ? __fprop_inc_percpu_max+0x130/0x130 [ 1029.795237] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 1029.796489] ? lock_release+0x680/0x680 [ 1029.797446] idr_alloc+0xc2/0x130 [ 1029.798263] ? idr_alloc_u32+0x2d0/0x2d0 [ 1029.799210] ? rwlock_bug.part.0+0x90/0x90 [ 1029.800222] p9_client_prepare_req.part.0+0x612/0xac0 [ 1029.801450] p9_client_rpc+0x220/0x1370 [ 1029.802381] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1029.803603] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1029.804854] ? pipe_poll+0x21b/0x800 [ 1029.805709] ? p9_fd_close+0x4a0/0x4a0 [ 1029.806607] ? wait_for_partner+0x3c0/0x3c0 [ 1029.807602] ? p9_fd_poll+0x1e0/0x2c0 [ 1029.808492] ? p9_fd_create+0x357/0x4a0 [ 1029.809416] ? p9_conn_create+0x510/0x510 [ 1029.810394] ? p9_client_create+0x798/0x1230 [ 1029.811465] ? kfree+0xd7/0x340 [ 1029.812255] ? do_raw_spin_unlock+0x4f/0x220 [ 1029.813319] p9_client_create+0xa76/0x1230 [ 1029.814517] ? p9_client_flush+0x430/0x430 [ 1029.815544] ? trace_hardirqs_on+0x5b/0x180 [ 1029.816774] ? lockdep_init_map_type+0x2c7/0x780 [ 1029.817965] ? __raw_spin_lock_init+0x36/0x110 [ 1029.819029] v9fs_session_init+0x1dd/0x1680 [ 1029.820098] ? lock_release+0x680/0x680 [ 1029.821043] ? kmem_cache_alloc_trace+0x151/0x320 [ 1029.822152] ? v9fs_show_options+0x690/0x690 [ 1029.823176] ? trace_hardirqs_on+0x5b/0x180 [ 1029.824171] ? kasan_unpoison_shadow+0x33/0x50 [ 1029.825239] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1029.826410] v9fs_mount+0x79/0x8f0 [ 1029.827229] ? v9fs_write_inode+0x60/0x60 [ 1029.828169] legacy_get_tree+0x105/0x220 [ 1029.829120] vfs_get_tree+0x8e/0x300 [ 1029.829974] path_mount+0x1490/0x21e0 [ 1029.830851] ? strncpy_from_user+0x9e/0x470 [ 1029.831840] ? finish_automount+0xa90/0xa90 [ 1029.832837] ? getname_flags.part.0+0x1dd/0x4f0 [ 1029.833896] ? _copy_from_user+0xfb/0x1b0 [ 1029.834871] __x64_sys_mount+0x282/0x300 [ 1029.835806] ? copy_mnt_ns+0xa00/0xa00 [ 1029.836714] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1029.837934] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1029.839113] do_syscall_64+0x33/0x40 [ 1029.839965] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1029.841144] RIP: 0033:0x7f42b2db2b19 [ 1029.842003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1029.846280] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1029.848012] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 1029.849644] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1029.851314] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 1029.852987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1029.854653] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 1029.909097] loop2: detected capacity change from 0 to 41948160 [ 1029.924242] loop4: detected capacity change from 0 to 41948160 [ 1029.937764] loop3: detected capacity change from 0 to 41948160 [ 1029.949090] FAT-fs (loop2): Unrecognized mount option "‹^úu{RÎ9ìûéÐmÆjÛ5çÑ€ºÆ¯‰‰ÅµW3ÞsëS…̌äü¾" or missing value 01:11:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) fchownat(r0, &(0x7f0000000000)='./file0\x00', r1, 0xee01, 0x400) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:11:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x109101, 0x1) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1030.050670] loop2: detected capacity change from 0 to 135266304 01:11:57 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:11:57 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000200)='mnt/encrypted_dir\x00') openat(r0, &(0x7f0000000000)='./mnt\x00', 0x101081, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syncfs(r0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:11:57 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 44) 01:11:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') open(&(0x7f0000000280)='mnt/encrypted_dir\x00', 0x40000, 0xc9) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) mkdirat(r0, &(0x7f00000002c0)='./file0\x00', 0x2) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x122}, &(0x7f00007d8000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) r3 = memfd_create(&(0x7f0000000340)='vfat\x00', 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000380)=@IORING_OP_CLOSE={0x13, 0x1, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3737) umount2(&(0x7f0000000300)='mnt/encrypted_dir\x00', 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./mnt\x00', 0x10000, 0x8) stat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) r4 = open$dir(&(0x7f0000000000)='mnt/encrypted_dir\x00', 0x200, 0x100) openat(r4, &(0x7f0000000200)='mnt/encrypted_dir\x00', 0x0, 0x2) [ 1030.097494] FAT-fs (loop2): Unrecognized mount option "‹^úu{RÎ9ìûéÐmÆjÛ5çÑ€ºÆ¯‰‰ÅµW3ÞsëS…̌äü¾" or missing value [ 1030.116603] FAULT_INJECTION: forcing a failure. [ 1030.116603] name failslab, interval 1, probability 0, space 0, times 0 [ 1030.118696] CPU: 0 PID: 7658 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 1030.119938] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1030.121468] Call Trace: [ 1030.121954] dump_stack+0x107/0x167 [ 1030.122620] should_fail.cold+0x5/0xa [ 1030.123325] ? create_object.isra.0+0x3a/0xa30 [ 1030.124167] should_failslab+0x5/0x20 [ 1030.124878] kmem_cache_alloc+0x5b/0x310 [ 1030.125615] create_object.isra.0+0x3a/0xa30 [ 1030.126413] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1030.127331] kmem_cache_alloc+0x159/0x310 [ 1030.128094] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1030.129123] idr_get_free+0x4b5/0x8f0 [ 1030.129820] idr_alloc_u32+0x170/0x2d0 [ 1030.130526] ? __fprop_inc_percpu_max+0x130/0x130 [ 1030.131400] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 1030.132359] ? lock_release+0x680/0x680 [ 1030.133103] idr_alloc+0xc2/0x130 [ 1030.133723] ? idr_alloc_u32+0x2d0/0x2d0 [ 1030.134449] ? rwlock_bug.part.0+0x90/0x90 [ 1030.135223] p9_client_prepare_req.part.0+0x612/0xac0 [ 1030.136160] p9_client_rpc+0x220/0x1370 [ 1030.136883] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1030.137830] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1030.138798] ? pipe_poll+0x21b/0x800 [ 1030.139467] ? p9_fd_close+0x4a0/0x4a0 [ 1030.140177] ? wait_for_partner+0x3c0/0x3c0 [ 1030.140970] ? p9_fd_poll+0x1e0/0x2c0 [ 1030.141667] ? p9_fd_create+0x357/0x4a0 [ 1030.142383] ? p9_conn_create+0x510/0x510 [ 1030.143123] ? p9_client_create+0x798/0x1230 [ 1030.143912] ? kfree+0xd7/0x340 [ 1030.144502] ? do_raw_spin_unlock+0x4f/0x220 [ 1030.145331] p9_client_create+0xa76/0x1230 [ 1030.146106] ? p9_client_flush+0x430/0x430 [ 1030.146872] ? trace_hardirqs_on+0x5b/0x180 [ 1030.147645] ? lockdep_init_map_type+0x2c7/0x780 [ 1030.148492] ? __raw_spin_lock_init+0x36/0x110 [ 1030.149335] v9fs_session_init+0x1dd/0x1680 [ 1030.150106] ? lock_release+0x680/0x680 [ 1030.150827] ? kmem_cache_alloc_trace+0x151/0x320 [ 1030.151684] ? v9fs_show_options+0x690/0x690 [ 1030.152480] ? trace_hardirqs_on+0x5b/0x180 [ 1030.153270] ? kasan_unpoison_shadow+0x33/0x50 [ 1030.154102] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1030.155011] v9fs_mount+0x79/0x8f0 [ 1030.155646] ? v9fs_write_inode+0x60/0x60 [ 1030.156392] legacy_get_tree+0x105/0x220 [ 1030.157149] vfs_get_tree+0x8e/0x300 [ 1030.157810] path_mount+0x1490/0x21e0 [ 1030.158494] ? strncpy_from_user+0x9e/0x470 [ 1030.159261] ? finish_automount+0xa90/0xa90 [ 1030.160031] ? getname_flags.part.0+0x1dd/0x4f0 [ 1030.160870] ? _copy_from_user+0xfb/0x1b0 [ 1030.161633] __x64_sys_mount+0x282/0x300 [ 1030.162351] ? copy_mnt_ns+0xa00/0xa00 [ 1030.163066] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1030.164005] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1030.164948] do_syscall_64+0x33/0x40 [ 1030.165617] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1030.166538] RIP: 0033:0x7f42b2db2b19 [ 1030.167209] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1030.170496] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1030.171839] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 1030.173115] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1030.174381] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 1030.175655] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1030.176922] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 01:11:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r0 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, {0x3, r0}}, 0x6) [ 1030.192279] loop1: detected capacity change from 0 to 41948160 [ 1030.220923] loop3: detected capacity change from 0 to 41948160 [ 1030.234233] loop6: detected capacity change from 0 to 41948160 01:11:57 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0xc0, 0x4, 0x15}, 0x18) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:11:57 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 45) [ 1030.279293] loop6: detected capacity change from 0 to 41948160 [ 1030.291235] FAULT_INJECTION: forcing a failure. [ 1030.291235] name failslab, interval 1, probability 0, space 0, times 0 [ 1030.293105] CPU: 0 PID: 7679 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 1030.294245] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1030.295599] Call Trace: [ 1030.296052] dump_stack+0x107/0x167 [ 1030.296645] should_fail.cold+0x5/0xa [ 1030.297286] ? create_object.isra.0+0x3a/0xa30 [ 1030.298045] should_failslab+0x5/0x20 [ 1030.298668] kmem_cache_alloc+0x5b/0x310 [ 1030.299334] create_object.isra.0+0x3a/0xa30 [ 1030.300050] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1030.300889] kmem_cache_alloc+0x159/0x310 [ 1030.301575] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1030.302493] idr_get_free+0x4b5/0x8f0 [ 1030.303128] idr_alloc_u32+0x170/0x2d0 [ 1030.303764] ? __fprop_inc_percpu_max+0x130/0x130 [ 1030.304554] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 1030.305440] ? lock_release+0x680/0x680 [ 1030.306087] idr_alloc+0xc2/0x130 [ 1030.306657] ? idr_alloc_u32+0x2d0/0x2d0 [ 1030.307316] ? rwlock_bug.part.0+0x90/0x90 [ 1030.308015] p9_client_prepare_req.part.0+0x612/0xac0 [ 1030.308863] p9_client_rpc+0x220/0x1370 [ 1030.309514] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1030.310370] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 1030.311238] ? pipe_poll+0x21b/0x800 [ 1030.311844] ? p9_fd_close+0x4a0/0x4a0 [ 1030.312472] ? wait_for_partner+0x3c0/0x3c0 [ 1030.313170] ? p9_fd_poll+0x1e0/0x2c0 [ 1030.313787] ? p9_fd_create+0x357/0x4a0 [ 1030.314427] ? p9_conn_create+0x510/0x510 [ 1030.315098] ? p9_client_create+0x798/0x1230 [ 1030.315808] ? kfree+0xd7/0x340 [ 1030.316337] ? do_raw_spin_unlock+0x4f/0x220 [ 1030.317065] p9_client_create+0xa76/0x1230 [ 1030.317762] ? p9_client_flush+0x430/0x430 [ 1030.318467] ? trace_hardirqs_on+0x5b/0x180 [ 1030.319180] ? lockdep_init_map_type+0x2c7/0x780 [ 1030.319969] ? __raw_spin_lock_init+0x36/0x110 [ 1030.320710] v9fs_session_init+0x1dd/0x1680 [ 1030.321432] ? lock_release+0x680/0x680 [ 1030.322097] ? kmem_cache_alloc_trace+0x151/0x320 [ 1030.322898] ? v9fs_show_options+0x690/0x690 [ 1030.323472] FAT-fs (loop6): Unrecognized mount option "mnt/encrypted_dir" or missing value [ 1030.323636] ? trace_hardirqs_on+0x5b/0x180 [ 1030.326400] ? kasan_unpoison_shadow+0x33/0x50 [ 1030.327169] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1030.328022] v9fs_mount+0x79/0x8f0 [ 1030.328603] ? v9fs_write_inode+0x60/0x60 [ 1030.329293] legacy_get_tree+0x105/0x220 [ 1030.329965] vfs_get_tree+0x8e/0x300 [ 1030.330577] path_mount+0x1490/0x21e0 [ 1030.331220] ? strncpy_from_user+0x9e/0x470 [ 1030.331927] ? finish_automount+0xa90/0xa90 [ 1030.332635] ? getname_flags.part.0+0x1dd/0x4f0 [ 1030.333410] ? _copy_from_user+0xfb/0x1b0 [ 1030.334124] __x64_sys_mount+0x282/0x300 [ 1030.334799] ? copy_mnt_ns+0xa00/0xa00 [ 1030.335438] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1030.336300] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1030.337158] do_syscall_64+0x33/0x40 [ 1030.337759] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1030.338598] RIP: 0033:0x7f42b2db2b19 [ 1030.339218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1030.342265] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1030.343517] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 1030.344682] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1030.345856] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 1030.347020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1030.348188] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 01:11:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x2800018, &(0x7f0000000240)=ANY=[]) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSPTLCK(r0, 0x540a, &(0x7f0000000040)) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x5, 0x200) futimesat(r1, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000200)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1030.403181] loop4: detected capacity change from 0 to 135266304 [ 1030.499911] FAT-fs (loop2): bogus number of reserved sectors [ 1030.501533] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1030.550759] FAT-fs (loop2): bogus number of reserved sectors [ 1030.551625] FAT-fs (loop2): Can't find a valid FAT filesystem 01:12:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, 'mnt/encrypted_dir\x00'}) 01:12:12 executing program 6: ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="23f0bb475832eea08f1424dc0752b088455a84a609de62d25deec47b8323688d80e8f1731b81fad11e4527bc7909d8761866d81adf476c92be9e0fd8c1fd3e4cf48a0fcfeb83806d9a6cd7dc9654b2b3e6ed6831238d332ef2cba2a0d5753aff24be13e79d21e1b771b007e1c1e777bcb765ed01ce6486c338e3ce1d9563f23e7b37f431aa619634928a9ca5ae17199ddbb3e59907313b46c3451c631ad5a8cf62ad0cb10824c79f8585dadc3b459738d2aa6837526ee819b409be7966d150d3d1639151dd811f8cc00a8359da68bc2d0bd6995314d77c00988abf1e8eec56b2000000000000"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) openat(r0, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x406000, 0x180) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:12 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 46) [ 1045.957389] loop6: detected capacity change from 0 to 41948160 01:12:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000200)='./mnt\x00', 0x3, 0x1, &(0x7f0000000280)=[{&(0x7f0000000240)="9d", 0x1, 0x3}], 0x1010860, &(0x7f00000002c0)={[{@nodots}], [{@appraise}, {@fowner_lt={'fowner<', r0}}, {@fowner_gt={'fowner>', r1}}]}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x1}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:12 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0xc0, 0x4, 0x15}, 0x18) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:12 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_TIMEOUT={0xb, 0x1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x1, 0x0, 0x1}, 0x8) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') getxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)=@known='system.sockprotoname\x00', &(0x7f0000000380)=""/42, 0x2a) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)) getdents64(r0, &(0x7f00000003c0)=""/78, 0x4e) 01:12:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000000)='./mnt\x00', 0x0, 0xffffffffffffffc4, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1045.982043] loop4: detected capacity change from 0 to 41948160 [ 1045.990589] loop2: detected capacity change from 0 to 41948160 [ 1045.992291] FAULT_INJECTION: forcing a failure. [ 1045.992291] name failslab, interval 1, probability 0, space 0, times 0 [ 1045.995554] CPU: 0 PID: 7716 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 1045.997450] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1045.999861] Call Trace: [ 1046.000607] dump_stack+0x107/0x167 [ 1046.001613] should_fail.cold+0x5/0xa [ 1046.002583] ? p9pdu_readf+0xadb/0x1d40 [ 1046.003550] should_failslab+0x5/0x20 [ 1046.004474] __kmalloc+0x72/0x390 [ 1046.005341] p9pdu_readf+0xadb/0x1d40 [ 1046.006284] ? pipe_poll+0x21b/0x800 [ 1046.007184] ? p9pdu_writef+0x100/0x100 [ 1046.008143] ? p9_fd_poll+0x1e0/0x2c0 [ 1046.009082] ? p9_fd_create+0x357/0x4a0 [ 1046.010053] ? p9_conn_create+0x510/0x510 [ 1046.011060] ? p9_client_create+0x798/0x1230 [ 1046.012113] ? kfree+0xd7/0x340 [ 1046.012923] ? do_raw_spin_unlock+0x4f/0x220 [ 1046.013999] p9_client_create+0xaee/0x1230 [ 1046.015036] ? p9_client_flush+0x430/0x430 [ 1046.016060] ? trace_hardirqs_on+0x5b/0x180 [ 1046.017119] ? lockdep_init_map_type+0x2c7/0x780 [ 1046.018268] ? __raw_spin_lock_init+0x36/0x110 [ 1046.019388] v9fs_session_init+0x1dd/0x1680 [ 1046.020433] ? lock_release+0x680/0x680 [ 1046.021416] ? kmem_cache_alloc_trace+0x151/0x320 [ 1046.022588] ? v9fs_show_options+0x690/0x690 [ 1046.023664] ? trace_hardirqs_on+0x5b/0x180 [ 1046.024703] ? kasan_unpoison_shadow+0x33/0x50 [ 1046.025816] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1046.027132] v9fs_mount+0x79/0x8f0 [ 1046.028067] ? v9fs_write_inode+0x60/0x60 [ 1046.029082] legacy_get_tree+0x105/0x220 [ 1046.030070] vfs_get_tree+0x8e/0x300 [ 1046.030972] path_mount+0x1490/0x21e0 [ 1046.031909] ? strncpy_from_user+0x9e/0x470 [ 1046.032980] ? finish_automount+0xa90/0xa90 [ 1046.034019] ? getname_flags.part.0+0x1dd/0x4f0 [ 1046.035168] ? _copy_from_user+0xfb/0x1b0 [ 1046.036195] __x64_sys_mount+0x282/0x300 [ 1046.037232] ? copy_mnt_ns+0xa00/0xa00 [ 1046.038185] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1046.039464] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1046.040782] do_syscall_64+0x33/0x40 [ 1046.041739] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1046.042989] RIP: 0033:0x7f42b2db2b19 [ 1046.043889] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1046.048388] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1046.050242] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 1046.051973] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1046.053780] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 1046.055510] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1046.057210] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 1046.072313] loop5: detected capacity change from 0 to 41948160 [ 1046.109015] loop3: detected capacity change from 0 to 41948160 01:12:13 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000003c0)=@IORING_OP_STATX={0x15, 0x4, 0x0, r0, &(0x7f0000000280), &(0x7f0000000380)='./file0\x00', 0x8, 0x400, 0x1}, 0x9) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='./mnt\x00', &(0x7f0000000240), 0x2121002, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1046.125621] loop1: detected capacity change from 0 to 41948160 [ 1046.138690] FAT-fs (loop1): Unrecognized mount option "./file0" or missing value 01:12:13 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0xc0, 0x4, 0x15}, 0x18) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1046.166795] FAT-fs (loop3): bogus number of FAT structure [ 1046.168216] FAT-fs (loop3): Can't find a valid FAT filesystem [ 1046.174866] loop5: detected capacity change from 0 to 135266304 01:12:13 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 47) [ 1046.214726] loop1: detected capacity change from 0 to 135266304 [ 1046.222882] FAT-fs (loop1): Unrecognized mount option "./file0" or missing value [ 1046.240258] loop3: detected capacity change from 0 to 41948160 [ 1046.259305] FAT-fs (loop3): bogus number of FAT structure [ 1046.260636] FAT-fs (loop3): Can't find a valid FAT filesystem 01:12:13 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000000)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:13 executing program 4: pipe(&(0x7f0000000000)) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./mnt\x00', 0x200, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x128) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1046.276996] loop6: detected capacity change from 0 to 41948160 01:12:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9, 0x9, 0x5, 0x1, 0x0, 0x1, 0xc0442, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4, 0x7ff}, 0x19108, 0x6, 0x100, 0x2, 0x5, 0x7, 0x6, 0x0, 0x502, 0x0, 0x3}, 0x0, 0xa, 0xffffffffffffffff, 0x7) chdir(&(0x7f0000000040)='./file0\x00') r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) syz_io_uring_submit(r4, r3, &(0x7f0000000100)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd_index}, 0x8001) syz_io_uring_submit(0x0, r3, &(0x7f0000000000)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x6000, @fd=r0, 0x85, 0x0, 0x0, 0x4, 0x0, {0x2}}, 0x0) [ 1046.355932] loop5: detected capacity change from 0 to 41948160 01:12:13 executing program 2: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00042bc84166a1dbdf061ecc1a7431ef55920f8be16937b8fa93e9634b71a8e7288a879eb8ca37fac609e32964a3d0ea1936e397060601f112fc89b200ea5f7b3e6fd42609af30f600"/86], 0x24}, 0x1, 0x0, 0x0, 0x54}, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r1, 0x0) mkdirat(r1, &(0x7f0000000240)='./mnt\x00', 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r3, 0x0) mkdirat(r3, &(0x7f00000004c0)='./mnt\x00', 0x102) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1046.392829] FAULT_INJECTION: forcing a failure. [ 1046.392829] name failslab, interval 1, probability 0, space 0, times 0 [ 1046.394220] CPU: 1 PID: 7750 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 1046.395010] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1046.395953] Call Trace: [ 1046.396265] dump_stack+0x107/0x167 [ 1046.396693] should_fail.cold+0x5/0xa [ 1046.397136] ? create_object.isra.0+0x3a/0xa30 [ 1046.397664] should_failslab+0x5/0x20 [ 1046.398099] kmem_cache_alloc+0x5b/0x310 [ 1046.398571] create_object.isra.0+0x3a/0xa30 [ 1046.399095] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1046.399659] __kmalloc+0x16e/0x390 [ 1046.400092] p9pdu_readf+0xadb/0x1d40 [ 1046.400547] ? pipe_poll+0x21b/0x800 [ 1046.400978] ? p9pdu_writef+0x100/0x100 [ 1046.401427] ? p9_fd_poll+0x1e0/0x2c0 [ 1046.401873] ? p9_fd_create+0x357/0x4a0 [ 1046.402383] ? p9_conn_create+0x510/0x510 [ 1046.402870] ? p9_client_create+0x798/0x1230 [ 1046.403367] ? kfree+0xd7/0x340 [ 1046.403744] ? do_raw_spin_unlock+0x4f/0x220 [ 1046.404249] p9_client_create+0xaee/0x1230 [ 1046.404731] ? p9_client_flush+0x430/0x430 [ 1046.405233] ? trace_hardirqs_on+0x5b/0x180 [ 1046.405733] ? lockdep_init_map_type+0x2c7/0x780 [ 1046.406274] ? __raw_spin_lock_init+0x36/0x110 [ 1046.406805] v9fs_session_init+0x1dd/0x1680 [ 1046.407301] ? lock_release+0x680/0x680 [ 1046.407762] ? kmem_cache_alloc_trace+0x151/0x320 [ 1046.408365] ? v9fs_show_options+0x690/0x690 [ 1046.408880] ? trace_hardirqs_on+0x5b/0x180 [ 1046.409387] ? kasan_unpoison_shadow+0x33/0x50 [ 1046.409906] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1046.410490] v9fs_mount+0x79/0x8f0 [ 1046.410898] ? v9fs_write_inode+0x60/0x60 [ 1046.411377] legacy_get_tree+0x105/0x220 [ 1046.411846] vfs_get_tree+0x8e/0x300 [ 1046.412280] path_mount+0x1490/0x21e0 [ 1046.412721] ? strncpy_from_user+0x9e/0x470 [ 1046.413228] ? finish_automount+0xa90/0xa90 [ 1046.413724] ? getname_flags.part.0+0x1dd/0x4f0 [ 1046.414263] ? _copy_from_user+0xfb/0x1b0 [ 1046.414747] __x64_sys_mount+0x282/0x300 [ 1046.415214] ? copy_mnt_ns+0xa00/0xa00 [ 1046.415661] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1046.416267] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1046.416911] do_syscall_64+0x33/0x40 [ 1046.417341] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1046.417935] RIP: 0033:0x7f42b2db2b19 [ 1046.418372] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1046.420625] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1046.421587] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 1046.422463] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1046.423345] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 1046.424232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1046.425114] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 1046.448313] loop4: detected capacity change from 0 to 41948160 [ 1046.513525] loop2: detected capacity change from 0 to 135266304 01:12:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') sendto(0xffffffffffffffff, &(0x7f0000000000)="55924b3c7977fd072489e974d33372d8cd217d0da435caffd10b867de66074", 0x1f, 0x20000008, &(0x7f0000000200)=@can, 0x80) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0}, './mnt\x00'}) recvmmsg(r1, &(0x7f0000000a40)=[{{&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @private}}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)=""/198, 0xc6}, {&(0x7f0000000480)=""/34, 0x22}], 0x3}, 0x1ff}, {{&(0x7f0000000540)=@xdp, 0x80, &(0x7f0000000940)=[{&(0x7f00000005c0)=""/111, 0x6f}, {&(0x7f0000000640)=""/125, 0x7d}, {&(0x7f00000006c0)=""/35, 0x23}, {&(0x7f0000000700)=""/34, 0x22}, {&(0x7f0000000740)=""/40, 0x28}, {&(0x7f0000000780)=""/168, 0xa8}, {&(0x7f0000000840)=""/179, 0xb3}, {&(0x7f0000000900)=""/4, 0x4}], 0x8, &(0x7f00000009c0)=""/122, 0x7a}, 0x400}], 0x2, 0x20, &(0x7f0000000ac0)={0x0, 0x3938700}) r2 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) lgetxattr(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)=@known='trusted.overlay.nlink\x00', &(0x7f0000000b80)=""/167, 0xa7) close(r2) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:28 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000280)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r2 = openat$cgroup_pressure(r1, &(0x7f0000000000)='memory.pressure\x00', 0x2, 0x0) poll(&(0x7f0000000200)=[{r2, 0x2}, {r0, 0x814}, {r0, 0x1}, {r0, 0x8}], 0x4, 0x2) 01:12:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/input', 0x80401, 0x10) r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x820090, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_user}, {@noextend}, {@afid={'afid', 0x3d, 0x80}}, {@cache_fscache}, {@fscache}, {@nodevmap}, {@fscache}, {@fscache}], [{@context={'context', 0x3d, 'staff_u'}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x65, 0x0, 0x61, 0x31, 0x32, 0x61, 0x62], 0x2d, [0x38, 0x30, 0x32, 0x55], 0x2d, [0x34, 0x62, 0x36, 0x65], 0x2d, [0x30, 0x30, 0x66, 0x62], 0x2d, [0x38, 0x37, 0x62, 0x39, 0x66, 0x31, 0x37, 0x32]}}}]}}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000200)='./file0\x00', 0x48c35fae, 0x5, &(0x7f0000001500)=[{&(0x7f0000000240)="e96455bfb3d0b75723f65869ca6da8734bb139d1ec410afb90110aab7e7f198e81af7df27b20db70977ca9f338a1c064e9a7d0f11bf5a310bdc21e377af67a5fa33b1b9a33ca1286822590123152917252e77d9d566a2648a5c345bbed23c49efcce231f7999866f629451b116c364359a0f6dc73f0909647adfc849acf515a41cf1702313e0606d6de5ee2c2c50a843f53e204de0bd557a6a9a9cb7ef04f9a8de6c8e4eb36667f47bd9efab4e3b44145ae28bd7f77ad5e1489be5b9105ff41a9a7638", 0xc3, 0x100}, {&(0x7f0000000340)="1a679d7593b5566dd8ec37dac633ef", 0xf, 0xfcd}, {&(0x7f0000000380)="8453b190e7e132aa336b98bc1afd4e681e48f16df1cdd71724f82d51fb9a42046a3f02e90f06d29686f77d4fb416704cb5", 0x31, 0x4}, {&(0x7f00000003c0)="882be0690b34b24c5e8a0327cc002a001c355a870f4a28a98c55c91317c130c9952f8e1f8050a9b41c2a95f1e7fa51bd2460fb4d6eaf1f73d6185bb8e2610906dca957c6818586d5cd79fedb7c5b29c85e85d3c8546ec0e5ba666bac1245ad418d54773974f9ae10603dd596ba9a674b63e5d93b4f968c2c6d5fe28ce02133a70353fd8867329740e4326a3c9bfc41e661824ff7b596665823f142915e931d6c0b38067c1cb074cb69dae4", 0xab, 0x3}, {&(0x7f0000000500)="052c6eb389c29519cef53cd0b90193097748a12e26df859f070d81384e92a57397f65375950222d0e9ae8c20657251e2495c96095269997081c40a5daf1236b01ed745e8c5ba6e68f479d6ed58d2f692cd140ccb480f89ae84702ee997bd38f5c536ff727d78c40213a03c20931288db32a806d71692b2683cd6b5e50ca00747b47d16d7bce6fa543e37c5a1926a9fe84960a32e63f02a2d3b52104c2b76af50f508ff5371c7dfc8090fe628daa8e1ed07834646eae0c12afee756067e4f02f13e1f096614a4b471fa98b4f2145ec5c2891556eac9573ff4e2071df252863975a5e505048902672dd82d8157e964aa007f1e1ad510ffdf9254d7e20faae0d141d216e9e3ef7ed5cd54c333bd0358ce5868f69d91c66a230286b4e369fd0aa9d6feb568ee0fe335000aa1aa3827538c4d510384a228fc69164bc39e386ea1b6653c2be76d00cd3f7ab91daac46e0e06514b94108c4ca5eec6dc3584e608c06f6c26826b79a334476474b85f05e193bfd5a3abb25ba301cb7693fb826fcac77d21984ca6553f34dba4d62da48dfc30993598af1759db2726fd3e4d3e973818621d37fd77147a1917fe6f92ec2ff7b4a28fb9003db29fcf52e3efd6101128f6de3b7416ce6eef76358b3e15a886cf137e9010bf70b21a31ce4962e29306b039bec110f7c5765d9f6f9bacc56926f92f30903b276a8cd9567b65085589ab1f48ea7ec9d38ddbbaca664a3f671d90513735497a461097f350bbab630f5e9a08663ea893b78c29be34c9068f67d51711005ea75e65e8ff2ef4169f3ca69eeb1f89d5dc44069aeafb4ceeaca8a956bba57adabde259dc5c3969a723e52c740c7d225a0b7db9479a4fe1bebdbb19063ee79bc9e6b4c7b1915829d44f71f5f0ad98860656ccf721485ec6d1b425201be8e11ca9c67d2e55f8bed8a55d68e18b53a033e0b70dde98dd134a901a77153a96692eab2f3244c9c02304c79b6e9d7c84ec2faa67c6b972ba2a64d266832cf6a323b1d210e47bede401a2df7262f4fab526d75a320d27962d9915860c80288326704f220821b426286688cdabedbd11949ca88025993b7adb54b91f8475ef7d63530035f1020f1a77bc7cf46431966d9bdf5328736884ac243ca7c1b644180172f9ce29c7beeaa15680fe28ab0dac59289d4b75048c646a71019521eecdbefd884fca8954fa5fdcaaeadade43838bb9009b76bcacd3cc3ccbdb0e37fce718ea77644c7bc2011a4b0e0473e445719f8203489172c79c1db5c0758d29dff11c2e180025d3585a50994944c7dd1c78c3588a899782e6f2659c55c6fd535e7a12a5f962a6842c4c1d6ae48201106c50fcfc4357d89ad1b29dbd6cf56b693b53cda35d17ab054e13791516bbf6da6661059bc16ba1d26a5c8ad02d19dc46b5a00681f7e5bf0df3e125807154bf13c45abfbfbc3ed36d5a0698c8a0417d863c3ed9ec08493f383a25d6ee1aaba79c0e5b8600a659313caa07d07e0aeef207327ada1d3cae5ee43832d837c7560af12498d71fb1acb88f3abf8360fff6f099d57177d35358cddbb12bf7f143c87dfb2a4356691cd03a495327873b967451241eaaa01b0b37d0bf37f3e363301b97ba9b0b45b3f3dea3f40f798e430a42cd7974ac47b69403a739d12d841de4b48c2d65858f074da1d501185ff43b9496337385c6ce7efd056354643fcec2d5bf6d21388bee1e231cbcb202e594b7bac540bfcc85573ae3de20bf4f99632f1695c9badb31447b3be41e02d14535c273dc8daaff867ded7cde14675099b2838f06be3aae962b5a212ac6771ad1790293bbe5da8bda955628eaea029f9ecf59eca40819f5d9ba5ed837f4a7fff39891197e7e0d203b522a24572c422126f5b580accd646a26748f43140990f260c905d0dddc17724c1bfd9001cec1b1eee5abc787c39b8692820c70fcd8f375eca6d345fce7027119c1b9bd1d062b4b6242fff71369b556b4183bfb5f604428bb9f089fd8dd4dfeb30db8acc1086ab2f91be4c4086b798620067054df78abc63697f51f79d67afa24821757172b2afc783b9e266e7476f71080cf1a74c11027307c9a9ee4f66908507666836f977eb41c30a2bb2daa86316b085a837550e75b6c4e24a4a4bfa9abf75f5c7c61b8765c21de7f063bb9a923c3df07771360fb5ab63608498d5a1db4c13c25bcc8aff2c3383c5e8595cc512b87d6d8ad0185bbb43c5c3c4e570d446cc37d1876843c42bb7809af4c0f59e56f25d71495c52a969eacf723ce5df3830571a86c750321fd7217e13b5a90f0a171310cd83c636e28c74ab786ed440dffd9607e8a55af3412194bdac17eed99f65df71a6713ef59b1321ce14cede91a9c3030d155ea5943987700f3675faac902e5d6d2bf646451422936591adab4a240eafdf45ac922bb2ad7bd27dbbd9c7500be508e9fe891607e5283b4d11377939321982c8b07ea34f8030b94adb5359f91754d0469452664a6f842603ae489a61e3278229d5e2aae2215df8932d830d1252e3afeadfe5262d0d5505d73153aaf3f70f141dd0cdb68c43b28790cc8b7ae93a8a3e05f41797ab1d857f0f624c65498d782c2bab7cdc0d555186b72d21811e876b13eb9fc94860d87f03a7c8bd9ba596cec1353f2aa2c7b305130862a8d97a21931cbca973c7a3cceec1a74f73f6b7b7b078734c226650dc797a3a32af65e02d994bf57c149563406b1dcf43ffdfab931af213ebf3f317ad728d161f9ba4e85c2a5c01569f4ea35f94006c3443bc13b4f01d363c0332602310fe220a19d5029d26c0a6456a11530167d906dd8a59ee61a800a4bbceebcace19483abe47d2de94839d427ea672f5cb3a314348693839d458205b02b4d9117a01326244350022d3f39e9777cd7d57458acd5a8acafabcc49b15256c52a7c5e4910ef83e28ab0a64ff0c15c52ceec90f5b8c217f1bf20b6e41e0a63cfd9f82ece08f9ac24ce4c8604dfdd462f08b51c42a33c101691c1bcdfd60eba1ab40ae22f656f41b74583dd1c4cf48b6752a5873266597a1384aa4b6356568893462e3e740b4a9f0ac391960352e0343648e21a4a23d4f1fa383bcbc556ad35dbfe8b11ac0f60290399e269df08c3b603ead6cf26ce4b9fbeec3d53f66b1135198bf15c4dda7b615435dd336d5bd910c62f5ced4de895cf65af9d298a51f75f138bb42e7cf13e0f5a719bfcdd34e81e3a15a0efc8c2e17095ff195d191a8ebe802e00a65da60a73df4f95697318426a157c90ba4dfa2d01d9e690ed2b3393b2993801ad318088934521b06a1dd7503ae825a8cee2fde203fb751dd23e7b7bc84686c6ef9b8a65784d90519504e8884f8a3380f0712e43de35caec7efe277c3c70dd2acafcccd61541e8b6eff7de830c0c7d85df328cd9847c6685f3cf5e290067cf17e1b0ab722131c11852ef43b598010ef8079565016e655f5c6819c60c9701f61e3732b696a60a0c21b17c040fa9c9610c1202e78cec03bdf24f55f25cb560306606215754752c568e5784c136a87194c7c048674f73a1bfb1593bf48f9c362c3d2385f18cbfc6c3b276be49a8b8a96abfbbe059e57e0c552accacfe72a85d6b9077179924da2ae484dc02d92ff7b36a63f9e7636a4fafa08be46b477b039e3b7fc1c92f1bcf9f290f635a3597e953af68182ac2ed6038e307caea27220c29a4d28a6265a9c780285f650b12a3663076e37a92b0bfeb0cd12d96180a98b39d1b4a20049853872f38f82bb8e79ef91346528277d17482c4ecb400a04935483789dccef02210bb0e2d0dd4e390ba7bce53600d9973c263e05178fc71f9a68471fa3dc6108f11263cb2e56147f70c3b9fb71360db6ec6ad38cbc801878abf2a5ed4433b7871294432869a0e9b4a7ec40806b7986d7ad168fad6a1f1addb4ac9efa0d23ccb93075a363256b4ab1b28c5e5194688475ae286f8018e78cc6b7f83b7347c6bcb4182e817efbe09d570b57692343bb7456338e3c668387a47140f4983a4c7b1d463c5bf848dd4f83f45574132fa29cdaa5eff807f3c5399b45195aa7408dde50a69d148d1d3e0e5fed2465d22c9949a4d43d63fc79986798099d12395301c40219d249e3ba13aa1af5a74ae2f2ed6981a32992c6dbf26235f4b99373114f38402ff64baa47457d1d7f1841d6ee057beccd2250b312cff4c505f5901029543fc97ffeb10f331e77ce4f94931b8f2eaaef5536e46f12931e488c4337d19ca810f2cb1830895efbbc0df0a97cca7e3b476c852f6a5abb779696dc44ae5941fe76744df9c022a1229913463744cd7e7a768a1cd016db9939a707ab8b22abc0350793edd00ed9219b20b7cdc1548e5c3477e53582d85a60a3f14fc322515a6f93a5c0e9ad8653955c0bd3c7dbc80dd4a65101824d6667f35e60feccfe28e6e701eafbe361ec54431b211e35d0a3e1533c3be3eefe8de9dfba08ce4717aa4c9b241ac33711e00234c758953b091848ef92a03a48cecd43fc786a6e92a5d12eaaff09fc7350139557d228059f634ede79a2d1e46f0609c9eac3e41f9fafdaec2406aba24769aa63490920a5ff4c58977e50fd5ac56ebf8e121c8ff867dace74c0212ee4648db9d7fe954e9cc26be47c46b4df9e1a13448f54aef5c0a1553ce5583b2a498d80d05d2b98c5dfa28401939f42c80db07437d54a20e9b8bdbe8e64614aeb7f7b3f33e1f9ff4e26787f352e1d0632ce8058a39b85b1a3a953c06731d28ffc0f07d9c5f0c4019da5e7af62e1b5e92a7d7df03d33bdb476e988747ac21af8730a31f7e0c98d6e9922b1595c7a7b5f86509a1bd17c6d3a97f7d62e1c173919f8fffc0d800ce5b0575fc99e70dd8046a860f6c55e4695cc6bd9d62f9142955aaff66694b706113c0c6eb406c900d137c9afec7b68075a816d7d1eea1a9f6c57f3788183831707e913d143f58207856dab7fefbb5613fba0a12a430175bba94253073d1f527991bc3775afb2cdc15229b2d20e074495da50cb434665eef5bb7ef50f9455bd8bc4c1cc74d8e32c1aead427f77bee43f31d205ddbc532942af7cf0c47fc61736af3c1ef394d40da0d831c3a30b66f9e46750847da79b040d1d63df90de6c0d2029741cfa442c08ad57d19fc712e622481786a9869fa9608a4d03c6d68774e22de5656c7cd10dd31e93c81729fea48d38a03346644ade3f52cbf82e36420a8e503079df265b92aac685ba0ff3e72d467e0a0d7001a822af8e0613617921e8d18e3a2919033b5ae3d65f8e65c2233ccfcba64823ad96cecfda002bc33ad11d8cfbb227baf934db2cb6dcba83be2770f7d52d100a76af8ee321d3b9030e291cfbd8adb5435dc235b5a654e597c9bc60a534ee20c2aca2b70d168c05c262622219cac67f2565aa6954458a89d6364059e2f985fb8d16c24b3cf401186767f5116418d0c3dd64d182dda128be529d1b6bbef858773ca57141bb59a3ea2009ebe60379cdbc3950a465e2c8786a5cc13112b4026a19d0260f98fa5e300976379f20ebf501a3e3a3aedfc3997e7a83a1ddcaf137cff400f757b9f31a3342800fdcf1e3acd89516aeec3e3020222f24163ccc4346ac4bb374626105c8ef847aff70838d52bf23e7cf7c9e50cbec98bb395924bc0d6a8198b28a82060486e6bf08e2a24968a190da4ec22b96768ff890ccdb8e3553cf5ba7375b159d9f487c49837eff70c5313286070f979cbc253d40127b7e0165347472e0bfbb4adefbfee5fe3308d00647afe6aeed0f471b2a089fc12a19a38f73dc56f6544c124a0b0ac05f4e798b52781739a2561a6bb44bdcd06562", 0x1000, 0xfffffffffffff06d}], 0x1011022, &(0x7f0000001580)=ANY=[@ANYBLOB='shortname=lower,nnonumtail=1,fscontext=unconfined_u,smackfs\a\x00\x00\x00\x00\x00\x00\x00t\x00,subj_user=vfat\x00,fsmagic=0x00000000000000ff,\x00']) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:28 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 48) 01:12:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000200)='./mnt\x00', 0x9, 0x0, &(0x7f0000000240), 0x80400, &(0x7f0000000280)={[{@huge_always}, {@uid={'uid', 0x3d, r0}}, {@huge_never}, {@size={'size', 0x3d, [0x34, 0x74, 0x74, 0x38, 0x0, 0x33, 0x34, 0x35, 0x32, 0x39]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x78]}}, {@uid={'uid', 0x3d, 0xee00}}], [{@uid_gt={'uid>', r1}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}]}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r2, 0x0) unlinkat(r2, &(0x7f0000000240)='./file0\x00', 0x0) 01:12:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80002080}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, 0x3f7, 0x300, 0x70bd25, 0x25dfdbfd, {0x11, 0x5, 'mnt/encrypted_dir', './mnt'}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x40000) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:28 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) stat(&(0x7f0000000200)='./mnt\x00', &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r2, 0x0) r3 = syz_mount_image$nfs4(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0x3f, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000340)="60251a5f2faa6e7782ae37669f9a75bcd7c7f6b23e4e5bf651d478bbd37ba7138b16e3f21320254b0be8025f7e75e4f21cfb6b7d1c1e8d1b15fa4d3a361a9d86d14f32cb9bbd0926e534f75b1396cdb32816c1f173e6978cc661ba234cf2866dc53daa3b4796c24f18a3fa14da0ef5f3594798092233bc05548320d89af390f2b3835b25834a1272c73e6eae063cdd0c19c82ba1190b4fa240703f76845ca1cbd0deb0eb2c295afcc5c0771e71af811d7b651013662151cf5dd7849975b5838ac8659ec692c05f846f1c596d5985f48244dcc021330a4cb5c9751c80a2", 0xdd, 0x9b1}, {&(0x7f0000000440)="b4d2b56df913926e75e2c8c9283f1eb93990c5eb0bb787ed9c3e4a9b478032e9bec7c253c39ab7767eabb19e38a10cd72a9b7e09ddd2d1c0a4b1a692cca9e00d79d4ee0fdecb6f202fe37a21cec0f59f08f60c5f11830d1f532c8e531c8798988c32a61e57fb", 0x66, 0x8}, {&(0x7f0000000500)="c159c5e07ceacb35227fb248bfaf802fca766c36c9ce0de6cb61f0997a1f2cccf5bf67", 0x23, 0x9}, {&(0x7f0000000540)='M', 0x1, 0xf15}, {&(0x7f0000000580)="67a85c85a5dab0ae3bd98036cdea4d7ec0947bc49788223bc2e4827a47545eebd88e02dd9921d6ea662be4d8795777666fbd9346886398c2efc273f38c61ffb7e75da3b5b0ea7ca0547bc6d815543ebd35faf1a81f641455f7003c7cd8e6f1f41f05b91011baf2370ca957400a731e", 0x6f, 0x1ff}, {&(0x7f0000000600)="f12be074ad9b3d28444198106eaf1d5b8e552144a5eb8ad5c92e0b63dc1daa6e", 0x20, 0x1f}, {&(0x7f0000000640)="709fdd4914e16117e573a83bfd8541b64356b9990154fa0bff75080a109db3749b67ab8ff4993157fdfcd3f50f8c931e2c24fa13a8ea59c5566dce30d1478fb4506ad0973b8a10b662be7e266cbd0b428ae06272757bb05e113fed1a0b72b9d5b03deffef3695f89b1c7bb614e3a98bda2df76232cac00e006753d3ff3cf81751ca812924bb139fdb4586811d41bbfa6fcdbf46306e61494a2727a9bc96f1a608397", 0xa2, 0x3369}, {&(0x7f0000000700)="b582d8c0f79746a29dfffb7aff11eb881b7c2ce4012d862b7ddc80981948cb7b276134958916b1dc8ad0e7f7d5819b0738df06700db7eca8a4c830049102c57df915adddb74e94f97883fa55e8e2a3295ba62f378891585e61872fb86e4e0369ea1e232213c4a231b698bfe514470eefcf3bafb056e8280fe41dc3333e93c144a0629e7f52ee982c32e3cd9e7e2fbdb4d7", 0x91, 0xa3a}, {&(0x7f00000007c0)="fdf77aa55b6dc69892233c903bed30a2830b9e8c9f40ac1a20555083a258f5d12cd2348d23017f19e6344b0f521ff7b3a6385f53ed81e1b6149dab0057d6a33e04c8cf031f70ba4dab3e27c5db0b60b92d7fced5489ee9cc8dc83ce5fd810540619831e16c9dc0d9da9e98efa09af18af8cc18cc4d011d2b34459d72f651d8d97cb0ccfb3906db11a7a898b5a86740c10313619d2967fff03773223888c6f0fbccd04fd8126da79d9ab6951b846b948ba3f81e63c534e172519367381099cdffc02dfd36e2e790a020dfa7f66cb359876b344734f55e0923dd32247f9469c24216261fbb2d7f21d6b61ae1118b2fd548a4a7ec2fff6de5", 0xf7, 0xe475}], 0x2000000, &(0x7f00000009c0)={[{'vfat\x00'}, {}, {'vfat\x00'}, {'vfat\x00'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise}, {@fowner_lt={'fowner<', r1}}]}) write$cgroup_devices(r2, &(0x7f0000000e40)={'a', ' *:* ', 'rm\x00'}, 0x9) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r4, &(0x7f0000001080)=ANY=[@ANYBLOB="3b7e40cfbf55e1208481906a4a08209d57da3d8856f5efade3ba1b30c6a1446896d29b0000"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r4, 0x0) ioctl$TIOCGPKT(r4, 0x80045438, &(0x7f0000001040)) r5 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000240), 0x14c42, 0x0) sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f0000000bc0)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b40)={0x20, 0x0, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0xc, 0x4, [0x10000, 0x5]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x24004800) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f0000000c00)={0x134, 0xf8, 0x4, 0x3, 0x9, [{0x1ff, 0x3, 0x5, '\x00', 0x208b}, {0x80, 0x4, 0x6, '\x00', 0x2}, {0x9d60, 0x100, 0x5, '\x00', 0xc00}, {0x9, 0x1000, 0x3, '\x00', 0x2201}, {0x4e, 0x1, 0x401, '\x00', 0x80}, {0x9, 0x10001, 0x7, '\x00', 0xc0c}, {0x969e, 0x100, 0x9, '\x00', 0x882}, {0xfff, 0x5, 0x4, '\x00', 0x2000}, {0x0, 0x29af, 0x9, '\x00', 0x1000}]}) sendmsg$IPSET_CMD_TEST(r2, &(0x7f0000001000)={&(0x7f0000000e80)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000ec0)={0xc8, 0xb, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IPSET_ATTR_DATA={0x40, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x101}, @IPSET_ATTR_COMMENT={0x7, 0x1a, 'rm\x00'}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e24}, @IPSET_ATTR_PROTO={0x5, 0x7, 0xc}, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x8}, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x7ff}, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz2\x00'}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x6479}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_ADT={0x58, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PROTO={0x5, 0x7, 0x29}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x9}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x4}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARK={0x8}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz1\x00'}}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x7}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) renameat(r2, &(0x7f0000000280)='mnt/encrypted_dir\x00', r3, &(0x7f0000000a40)='./file0\x00') [ 1061.602352] loop6: detected capacity change from 0 to 41948160 [ 1061.617055] loop3: detected capacity change from 0 to 41948160 [ 1061.625460] loop5: detected capacity change from 0 to 41948160 [ 1061.630899] loop2: detected capacity change from 0 to 41948160 [ 1061.638788] FAULT_INJECTION: forcing a failure. [ 1061.638788] name failslab, interval 1, probability 0, space 0, times 0 [ 1061.640080] loop4: detected capacity change from 0 to 41948160 [ 1061.640314] CPU: 0 PID: 7792 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 1061.642565] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1061.643415] loop1: detected capacity change from 0 to 41948160 [ 1061.643775] Call Trace: [ 1061.643796] dump_stack+0x107/0x167 [ 1061.643809] should_fail.cold+0x5/0xa [ 1061.643827] should_failslab+0x5/0x20 [ 1061.647108] __kmalloc_track_caller+0x79/0x370 [ 1061.647777] ? kasprintf+0xbb/0xf0 [ 1061.648299] ? __delete_object+0xb3/0x100 [ 1061.648911] kvasprintf+0xb5/0x150 [ 1061.649442] ? bust_spinlocks+0xe0/0xe0 [ 1061.650028] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1061.650807] kasprintf+0xbb/0xf0 [ 1061.651307] ? kvasprintf_const+0x1a0/0x1a0 [ 1061.651950] ? kmem_cache_free+0x249/0x2d0 [ 1061.652572] ? p9_client_create+0xbfa/0x1230 [ 1061.653229] p9_client_create+0xc1b/0x1230 [ 1061.653860] ? p9_client_flush+0x430/0x430 [ 1061.654472] ? trace_hardirqs_on+0x5b/0x180 [ 1061.655105] ? lockdep_init_map_type+0x2c7/0x780 [ 1061.655800] ? __raw_spin_lock_init+0x36/0x110 [ 1061.656468] v9fs_session_init+0x1dd/0x1680 [ 1061.657105] ? lock_release+0x680/0x680 [ 1061.657694] ? kmem_cache_alloc_trace+0x151/0x320 [ 1061.658395] ? v9fs_show_options+0x690/0x690 [ 1061.659040] ? trace_hardirqs_on+0x5b/0x180 [ 1061.659665] ? kasan_unpoison_shadow+0x33/0x50 [ 1061.660329] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1061.661086] v9fs_mount+0x79/0x8f0 [ 1061.661599] ? v9fs_write_inode+0x60/0x60 [ 1061.662209] legacy_get_tree+0x105/0x220 [ 1061.662803] vfs_get_tree+0x8e/0x300 [ 1061.663345] path_mount+0x1490/0x21e0 [ 1061.663911] ? strncpy_from_user+0x9e/0x470 [ 1061.664535] ? finish_automount+0xa90/0xa90 [ 1061.665175] ? getname_flags.part.0+0x1dd/0x4f0 [ 1061.665858] ? _copy_from_user+0xfb/0x1b0 [ 1061.666471] __x64_sys_mount+0x282/0x300 [ 1061.667059] ? copy_mnt_ns+0xa00/0xa00 [ 1061.667634] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1061.668407] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1061.669166] do_syscall_64+0x33/0x40 [ 1061.669707] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1061.670458] RIP: 0033:0x7f42b2db2b19 [ 1061.671000] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1061.673689] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1061.674799] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 1061.675830] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1061.676870] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 1061.677920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1061.678960] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 01:12:28 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd_index}, 0x8001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r4, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001740)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f0000000480)={&(0x7f0000000200)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000280)=""/245, 0xf5}, {&(0x7f0000000000)=""/13, 0xd}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000380)=""/89, 0x59}, {&(0x7f0000000400)=""/27, 0x1b}, {&(0x7f0000000440)=""/15, 0xf}, {&(0x7f0000001500)=""/214, 0xd6}], 0x7, &(0x7f0000001680)=""/142, 0x8e}, 0x0, 0x0, 0x0, {0x1}}, 0x803) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:28 executing program 7: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00042bc84166a1dbdf061ecc1a7431ef55920f8be16937b8fa93e9634b71a8e7288a879eb8ca37fac609e32964a3d0ea1936e397060601f112fc89b200ea5f7b3e6fd42609af30f600"/86], 0x24}, 0x1, 0x0, 0x0, 0x54}, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r1, 0x0) mkdirat(r1, &(0x7f0000000240)='./mnt\x00', 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r3, 0x0) mkdirat(r3, &(0x7f00000004c0)='./mnt\x00', 0x102) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:28 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) r1 = openat(r0, &(0x7f0000000340)='mnt/encrypted_dir\x00', 0xa590bd0dbf915a38, 0x0) r2 = dup3(r0, r1, 0x0) sendfile(r2, r1, &(0x7f0000000300)=0x40, 0x1f) chdir(&(0x7f0000000040)='./file0\x00') syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x2004, @fd_index=0x9, 0x401, &(0x7f0000000240)=[{&(0x7f0000000000)=""/33, 0x21}, {&(0x7f0000000480)=""/62, 0x3e}], 0x2, 0x11, 0x1}, 0x6) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x80000) write$P9_RREADLINK(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="1000000017020007002e2f6669dd6c6530188c9b60a5a6b9487097989070782016ce8d078bf4e2f5c6ee09b1ba939cb49b57a6e80157ee21d94e672397b956efdbbfda7df1171919cdc1703e72eda6b442c10d703b8c17a747db76a01db43529d6da779433f4bc471d417abfa741fc9b91db1a9afa768811a3e001d20202243ea0dd5ed7678cd4158c548c1f1c21855d665ae5a47c6ac40a36e759dc5261547f8b8b144c38341160f11497999a42fd60078a7ad61f2ef82642deba91c94176deb7a7281f7bc64268f5e75b8c"], 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:28 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 49) [ 1061.867877] FAULT_INJECTION: forcing a failure. [ 1061.867877] name failslab, interval 1, probability 0, space 0, times 0 [ 1061.869438] CPU: 0 PID: 7817 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 1061.870445] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1061.871648] Call Trace: [ 1061.872033] dump_stack+0x107/0x167 [ 1061.872568] should_fail.cold+0x5/0xa [ 1061.873138] ? create_object.isra.0+0x3a/0xa30 [ 1061.873798] should_failslab+0x5/0x20 [ 1061.874353] kmem_cache_alloc+0x5b/0x310 [ 1061.874944] ? vsnprintf+0x4ba/0x1600 [ 1061.875500] create_object.isra.0+0x3a/0xa30 [ 1061.876130] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1061.876866] __kmalloc_track_caller+0x177/0x370 [ 1061.877543] ? kasprintf+0xbb/0xf0 [ 1061.878066] kvasprintf+0xb5/0x150 [ 1061.878578] ? bust_spinlocks+0xe0/0xe0 [ 1061.879162] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1061.879931] kasprintf+0xbb/0xf0 [ 1061.880420] ? kvasprintf_const+0x1a0/0x1a0 [ 1061.881045] ? kmem_cache_free+0x249/0x2d0 [ 1061.881667] ? p9_client_create+0xbfa/0x1230 [ 1061.882305] p9_client_create+0xc1b/0x1230 [ 1061.882928] ? p9_client_flush+0x430/0x430 [ 1061.883544] ? trace_hardirqs_on+0x5b/0x180 [ 1061.884172] ? lockdep_init_map_type+0x2c7/0x780 [ 1061.884854] ? __raw_spin_lock_init+0x36/0x110 [ 1061.885532] v9fs_session_init+0x1dd/0x1680 [ 1061.886160] ? lock_release+0x680/0x680 [ 1061.886743] ? kmem_cache_alloc_trace+0x151/0x320 [ 1061.887441] ? v9fs_show_options+0x690/0x690 [ 1061.888085] ? trace_hardirqs_on+0x5b/0x180 [ 1061.888706] ? kasan_unpoison_shadow+0x33/0x50 [ 1061.889371] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1061.890108] v9fs_mount+0x79/0x8f0 [ 1061.890622] ? v9fs_write_inode+0x60/0x60 [ 1061.891219] legacy_get_tree+0x105/0x220 [ 1061.891813] vfs_get_tree+0x8e/0x300 [ 1061.892352] path_mount+0x1490/0x21e0 [ 1061.892910] ? strncpy_from_user+0x9e/0x470 [ 1061.893536] ? finish_automount+0xa90/0xa90 [ 1061.894160] ? getname_flags.part.0+0x1dd/0x4f0 [ 1061.894834] ? _copy_from_user+0xfb/0x1b0 [ 1061.895443] __x64_sys_mount+0x282/0x300 [ 1061.896030] ? copy_mnt_ns+0xa00/0xa00 [ 1061.896599] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1061.897369] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1061.898121] do_syscall_64+0x33/0x40 [ 1061.898659] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1061.899398] RIP: 0033:0x7f42b2db2b19 [ 1061.899940] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1061.902609] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1061.903712] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 1061.904752] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1061.905791] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 1061.906824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1061.907852] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 01:12:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x4}}, 'mnt/encrypted_dir\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./mnt\x00', 0x4602, 0x100) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x10010009fe}], 0x2800018, &(0x7f0000000000)=ANY=[@ANYRES16, @ANYRES64=0x0, @ANYRESOCT=0x0]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1062.015671] loop1: detected capacity change from 0 to 41947648 [ 1062.018627] FAT-fs (loop1): Unrecognized mount option "ÿÿ" or missing value [ 1062.027264] loop5: detected capacity change from 0 to 41948160 [ 1062.037397] loop2: detected capacity change from 0 to 41948160 [ 1062.047656] loop1: detected capacity change from 0 to 41947648 [ 1062.052908] FAT-fs (loop1): Unrecognized mount option "ÿÿ" or missing value 01:12:41 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000500)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r2 = signalfd(r1, &(0x7f00000000c0)={[0xffffffffffff7fff]}, 0x8) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000005c0)={0x0, 0x0}) syz_open_dev$tty1(0xc, 0x4, 0x3) utimensat(r2, &(0x7f0000000540)='./file1\x00', &(0x7f0000000780)={{r3, r4/1000+10000}, {r5, r6/1000+60000}}, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000000)='mnt/encrypted_dir\x00') mkdirat(r0, &(0x7f0000000600)='mnt/encrypted_dir\x00', 0x18) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000000480)=0xe8) syz_mount_image$nfs4(&(0x7f00000001c0), &(0x7f0000000200)='mnt/encrypted_dir\x00', 0x7fffffff, 0x1, &(0x7f0000000340)=[{&(0x7f0000000240)="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", 0xfd}], 0x200042, &(0x7f0000000640)=ANY=[@ANYBLOB="76666174002c5e2c76666174002c76666174002c2a7b2c5c2c5d5d2c2c2c492c61757a69742c646f6e745f61707072616973652c736d0174f85173f45c3b2a8d8fe2ea653d252c2f2d2c2d247b5e3a2c7569643d0f179d75fabed1ab2045032c639fd32087f509fc1255d634f901308aa695e906e62be21fc99a632c02d6c546af50c095ddefa91bbb0a6ed9540bb23109b6014587e9eec0580d2fd5d90650a6329f1003e8773f2089df81c8111942964790ae1afc38b4500b6c8682529ad30ec4ca07ba605c0492080725", @ANYRESDEC=r7, @ANYBLOB=',euid=', @ANYRESDEC, @ANYBLOB="2c636f6e746578743d726f6f742c646f6e745f61707072616973652c686173682c736d61636b66737472616e736d7574653d24f72c66756e633d4250524d5f434845434b2c00"]) 01:12:41 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./mnt\x00', 0xa) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:41 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./mnt\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') openat(r0, &(0x7f0000000200)='./file0/file0\x00', 0x202, 0x82) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:41 executing program 7: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00042bc84166a1dbdf061ecc1a7431ef55920f8be16937b8fa93e9634b71a8e7288a879eb8ca37fac609e32964a3d0ea1936e397060601f112fc89b200ea5f7b3e6fd42609af30f600"/86], 0x24}, 0x1, 0x0, 0x0, 0x54}, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r1, 0x0) mkdirat(r1, &(0x7f0000000240)='./mnt\x00', 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r3, 0x0) mkdirat(r3, &(0x7f00000004c0)='./mnt\x00', 0x102) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:41 executing program 3: io_setup(0x80000000, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x8, 0x9, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, &(0x7f0000000380)={&(0x7f0000000340)={[0xcc6e]}, 0x8}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:41 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 50) 01:12:41 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) sendto$unix(r0, &(0x7f0000000200)="d7dcb7340b92e1d7e4c43fc62e2179f75bf940efa644c5ca38889cba031d2483f3897736ddea4472842c1a31dc03702469be8d72b79230f4788ed2eebbb1b8fa673aeefe5c8a79e9400d8ecc54ea325fa9211d43c5dc5a064c129264b4fa930df62643134bbed807ef419351d46a8ac44ba46e1e3b39add79e897cfa97d3659ccfd86597a9ee0fcc5fe7174e16cf72b222f580a70d17f811585f49542d3848fc827e7faedae16b33ea1a9538333321ad0b174ddf585acdf2fa02526d0dc05fddd25c3a441776b47765478985b858bae5361dae0b", 0xd4, 0x4000, &(0x7f0000000300)=@file={0x0, './mnt\x00'}, 0x6e) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:41 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x200}, {0x0, 0x0, 0x1001002a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000200)='./file1\x00') mkdirat(r0, &(0x7f0000000440)='./file1\x00', 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./mnt\x00', 0x100, 0x110) r1 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='mnt/encrypted_dir\x00', &(0x7f0000000240)={0x4904c0, 0xe0, 0x16}, 0x18) openat(r1, &(0x7f0000000280)='./mnt/file0\x00', 0x1e1600, 0x169) openat(r1, &(0x7f0000000400)='./mnt\x00', 0x200, 0x140) r2 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000100)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd_index}, 0x8001) syz_io_uring_submit(0x0, r4, &(0x7f0000000300)=@IORING_OP_OPENAT={0x12, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)='./file1\x00', 0x100, 0x20000, 0x23456}, 0x90) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1074.820408] loop3: detected capacity change from 0 to 41948160 [ 1074.828122] FAULT_INJECTION: forcing a failure. [ 1074.828122] name failslab, interval 1, probability 0, space 0, times 0 [ 1074.831013] CPU: 0 PID: 7853 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 1074.832587] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1074.834497] Call Trace: [ 1074.835107] dump_stack+0x107/0x167 [ 1074.835943] should_fail.cold+0x5/0xa [ 1074.836812] should_failslab+0x5/0x20 [ 1074.837691] __kmalloc_track_caller+0x79/0x370 [ 1074.838727] ? kstrdup_const+0x53/0x80 [ 1074.839614] ? kasprintf+0xbb/0xf0 [ 1074.840429] kstrdup+0x36/0x70 [ 1074.841167] kstrdup_const+0x53/0x80 [ 1074.842033] kmem_cache_create_usercopy+0x12f/0x2f0 [ 1074.843189] p9_client_create+0xc6a/0x1230 [ 1074.844174] ? p9_client_flush+0x430/0x430 [ 1074.845150] ? trace_hardirqs_on+0x5b/0x180 [ 1074.846159] ? lockdep_init_map_type+0x2c7/0x780 [ 1074.847241] ? __raw_spin_lock_init+0x36/0x110 [ 1074.848279] v9fs_session_init+0x1dd/0x1680 [ 1074.849274] ? lock_release+0x680/0x680 [ 1074.850196] ? kmem_cache_alloc_trace+0x151/0x320 [ 1074.851292] ? v9fs_show_options+0x690/0x690 [ 1074.852309] ? trace_hardirqs_on+0x5b/0x180 [ 1074.853319] ? kasan_unpoison_shadow+0x33/0x50 [ 1074.854367] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1074.855538] v9fs_mount+0x79/0x8f0 [ 1074.856355] ? v9fs_write_inode+0x60/0x60 [ 1074.857317] legacy_get_tree+0x105/0x220 [ 1074.858255] vfs_get_tree+0x8e/0x300 [ 1074.859109] path_mount+0x1490/0x21e0 [ 1074.859986] ? strncpy_from_user+0x9e/0x470 [ 1074.860975] ? finish_automount+0xa90/0xa90 [ 1074.861964] ? getname_flags.part.0+0x1dd/0x4f0 [ 1074.863037] ? _copy_from_user+0xfb/0x1b0 [ 1074.863998] __x64_sys_mount+0x282/0x300 [ 1074.864926] ? copy_mnt_ns+0xa00/0xa00 [ 1074.865833] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1074.867036] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1074.868215] do_syscall_64+0x33/0x40 [ 1074.869069] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1074.870268] RIP: 0033:0x7f42b2db2b19 [ 1074.871128] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1074.875339] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1074.877094] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 1074.878731] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1074.880362] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 1074.881997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1074.883630] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 1074.885503] kmem_cache_create(9p-fcall-cache-92) failed with error -12 [ 1074.887044] CPU: 0 PID: 7853 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 1074.888600] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1074.890499] Call Trace: [ 1074.891098] dump_stack+0x107/0x167 [ 1074.891944] kmem_cache_create_usercopy.cold+0x17/0x65 [ 1074.893162] p9_client_create+0xc6a/0x1230 [ 1074.894162] ? p9_client_flush+0x430/0x430 [ 1074.895123] ? trace_hardirqs_on+0x5b/0x180 [ 1074.896122] ? lockdep_init_map_type+0x2c7/0x780 [ 1074.897215] ? __raw_spin_lock_init+0x36/0x110 [ 1074.898275] v9fs_session_init+0x1dd/0x1680 [ 1074.899263] ? lock_release+0x680/0x680 [ 1074.899883] loop5: detected capacity change from 0 to 41948160 [ 1074.900180] ? kmem_cache_alloc_trace+0x151/0x320 [ 1074.900200] ? v9fs_show_options+0x690/0x690 [ 1074.900229] ? trace_hardirqs_on+0x5b/0x180 [ 1074.904610] ? kasan_unpoison_shadow+0x33/0x50 [ 1074.905676] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1074.906838] v9fs_mount+0x79/0x8f0 [ 1074.907657] ? v9fs_write_inode+0x60/0x60 [ 1074.908605] legacy_get_tree+0x105/0x220 [ 1074.909550] vfs_get_tree+0x8e/0x300 [ 1074.910406] path_mount+0x1490/0x21e0 [ 1074.911286] ? strncpy_from_user+0x9e/0x470 [ 1074.912274] ? finish_automount+0xa90/0xa90 01:12:41 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9, 0x9, 0x5, 0x1, 0x0, 0x1, 0xc0442, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4, 0x7ff}, 0x19108, 0x6, 0x100, 0x2, 0x5, 0x7, 0x6, 0x0, 0x502, 0x0, 0x3}, 0x0, 0xa, 0xffffffffffffffff, 0x7) chdir(&(0x7f0000000040)='./file0\x00') r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) syz_io_uring_submit(r4, r3, &(0x7f0000000100)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd_index}, 0x8001) syz_io_uring_submit(0x0, r3, &(0x7f0000000000)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x6000, @fd=r0, 0x85, 0x0, 0x0, 0x4, 0x0, {0x2}}, 0x0) [ 1074.913275] ? getname_flags.part.0+0x1dd/0x4f0 [ 1074.914545] ? _copy_from_user+0xfb/0x1b0 [ 1074.915508] __x64_sys_mount+0x282/0x300 [ 1074.916438] ? copy_mnt_ns+0xa00/0xa00 [ 1074.917347] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1074.918555] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1074.919754] do_syscall_64+0x33/0x40 [ 1074.920614] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1074.921827] RIP: 0033:0x7f42b2db2b19 [ 1074.922673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1074.926920] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1074.928662] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 1074.930312] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1074.931930] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 1074.933534] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1074.935123] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 1074.956141] loop6: detected capacity change from 0 to 41948160 [ 1074.977072] loop2: detected capacity change from 0 to 41948160 [ 1074.981717] loop4: detected capacity change from 0 to 41964544 [ 1074.986930] loop1: detected capacity change from 0 to 41948160 [ 1074.996697] FAT-fs (loop1): Unrecognized mount option "g:îþ\Šyé@ŽÌTê2_©!CÅÜZL’d´ú“ö&CK¾ØïA“QÔjŠÄK¤n;9­×ž‰|ú—ÓeœÏØe—©îÌ_çNÏr²"õ€§øX_IT-8Hü‚~®Úák3ê•833!­ MßXZÍòúRmÀ_ÝÒ\:Dv´weG‰…¸Xºå6® " or missing value [ 1075.008569] FAT-fs (loop4): Unrecognized mount option "ÀI" or missing value 01:12:42 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) futimesat(r0, &(0x7f0000000000)='./mnt\x00', &(0x7f0000000240)={{0x77359400}, {r1, r2/1000+60000}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1075.064645] loop4: detected capacity change from 0 to 41964544 [ 1075.074667] FAT-fs (loop4): Unrecognized mount option "ÀI" or missing value [ 1075.085446] loop1: detected capacity change from 0 to 135266304 [ 1075.090560] FAT-fs (loop1): Unrecognized mount option "g:îþ\Šyé" or missing value [ 1075.177134] loop6: detected capacity change from 0 to 41948160 01:12:42 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) syz_io_uring_complete(0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x88) openat(0xffffffffffffffff, &(0x7f0000000ac0)='./file1\x00', 0x82d01, 0x30) setsockopt$WPAN_SECURITY_LEVEL(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000240), 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46042e000000000000000000000000000000000000000000008000000040000000000000007003000000000000ff010000000038000200ffff00005afd070000000000000000000000000000003bdf00000000000005000000000000000000000000000000000000000000000000000000000000000000b245c7e800"/445], 0x278) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) io_uring_enter(r2, 0x58ab, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='mnt/encrypted_dir\x00', &(0x7f0000000200), 0x5400, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cachetag={'cachetag', 0x3d, '//{5'}}, {@posixacl}, {@access_any}, {@privport}, {@noextend}, {@cache_loose}, {@cachetag}, {@privport}], [{@appraise}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'vfat\x00'}}]}}) 01:12:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) chdir(&(0x7f0000000000)='./file0\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:42 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 51) [ 1075.225259] FAULT_INJECTION: forcing a failure. [ 1075.225259] name failslab, interval 1, probability 0, space 0, times 0 [ 1075.227969] CPU: 0 PID: 7889 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 1075.229521] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1075.231390] Call Trace: [ 1075.231995] dump_stack+0x107/0x167 [ 1075.232813] should_fail.cold+0x5/0xa [ 1075.233684] ? create_object.isra.0+0x3a/0xa30 [ 1075.234708] should_failslab+0x5/0x20 [ 1075.235570] kmem_cache_alloc+0x5b/0x310 [ 1075.236481] ? lock_acquire+0x197/0x470 [ 1075.237399] create_object.isra.0+0x3a/0xa30 01:12:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000080)="eb3c909ab0bb81ae2c6d6b66732e66617400020801000470008400f801", 0x1d}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]) chdir(&(0x7f0000000040)='./mnt\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x125080, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1075.238383] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1075.239785] __kmalloc_track_caller+0x177/0x370 [ 1075.240856] ? kstrdup_const+0x53/0x80 [ 1075.241763] ? kasprintf+0xbb/0xf0 [ 1075.242583] kstrdup+0x36/0x70 [ 1075.243320] kstrdup_const+0x53/0x80 [ 1075.244174] kmem_cache_create_usercopy+0x12f/0x2f0 [ 1075.245343] p9_client_create+0xc6a/0x1230 [ 1075.246330] ? p9_client_flush+0x430/0x430 [ 1075.247309] ? trace_hardirqs_on+0x5b/0x180 [ 1075.248303] ? lockdep_init_map_type+0x2c7/0x780 [ 1075.249402] ? __raw_spin_lock_init+0x36/0x110 [ 1075.250463] v9fs_session_init+0x1dd/0x1680 [ 1075.251454] ? lock_release+0x680/0x680 [ 1075.252382] ? kmem_cache_alloc_trace+0x151/0x320 [ 1075.253494] ? v9fs_show_options+0x690/0x690 [ 1075.254514] ? trace_hardirqs_on+0x5b/0x180 [ 1075.255505] ? kasan_unpoison_shadow+0x33/0x50 [ 1075.256551] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1075.257803] v9fs_mount+0x79/0x8f0 [ 1075.258626] ? v9fs_write_inode+0x60/0x60 [ 1075.259575] legacy_get_tree+0x105/0x220 [ 1075.260513] vfs_get_tree+0x8e/0x300 [ 1075.261386] path_mount+0x1490/0x21e0 [ 1075.262270] ? strncpy_from_user+0x9e/0x470 [ 1075.263264] ? finish_automount+0xa90/0xa90 [ 1075.264255] ? getname_flags.part.0+0x1dd/0x4f0 [ 1075.265333] ? _copy_from_user+0xfb/0x1b0 [ 1075.266299] __x64_sys_mount+0x282/0x300 [ 1075.267233] ? copy_mnt_ns+0xa00/0xa00 [ 1075.268130] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1075.269344] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1075.270530] do_syscall_64+0x33/0x40 [ 1075.271387] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1075.272564] RIP: 0033:0x7f42b2db2b19 [ 1075.273430] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1075.277670] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1075.279437] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 1075.281111] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1075.282919] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 1075.284517] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1075.286136] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 01:12:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000200)='./file0\x00', 0x401, 0x4, &(0x7f0000000400)=[{&(0x7f0000000240)="eb6760e8e72a89046d71a4c8fec7bfc41f876a827d068215a40f779f1a8eafa2756c2e93858bd4d5e703909a2ddac5004b027918341bf177e3622773a9f88ae5008d1116793154b0cb", 0x49, 0xfffffffffffffff9}, {&(0x7f00000002c0)="1e89edac848aab21657af651eb7228608e71ede6193b3f94f5641e7b9eb5de3396a16eb9ed241d9e9d2c9735b45d579ec3cf86935b1887c19c3c906c0dff05f71fa54ceb21863e7fe722448636f50b0241ab87", 0x53, 0xfff}, {&(0x7f0000000340)="bf937a997098450101ef09849b133f84d627618040ae55118351f19dc6799a3f0cf922223458838153095f4b2246ae99d05af3699bbf2502ee8d36e96b69f9dd856c378e7fb2", 0x46, 0x2}, {&(0x7f00000003c0)="9fd4b1fad0c084cbf19a0607562e9a9895eceea28df3e2b43acbad1130", 0x1d, 0xfffffffffffffbff}], 0x200000, &(0x7f0000000500)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@cruft}, {@cruft}, {@hide}, {}, {@uid}, {@map_normal}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@uid_lt={'uid<', r0}}, {@dont_appraise}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000680)=@abs, 0x6e, &(0x7f0000000940)=[{&(0x7f0000000700)=""/150, 0x96}, {&(0x7f00000007c0)=""/128, 0x80}, {&(0x7f0000000840)=""/249, 0xf9}], 0x3, &(0x7f0000000980)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0xa0}, 0x40) mount$9p_unix(&(0x7f00000005c0)='mnt/encrypted_dir\x00', &(0x7f0000000600)='./mnt\x00', &(0x7f0000000640), 0x1030080, &(0x7f0000000a80)={'trans=unix,', {[{@cachetag={'cachetag', 0x3d, ',.\xd1.\x84#&\x84}!^'}}, {@access_any}, {@msize={'msize', 0x3d, 0x9}}], [{@fowner_lt={'fowner<', r1}}, {@dont_appraise}, {@subj_type={'subj_type', 0x3d, 'uid'}}, {@obj_user={'obj_user', 0x3d, 'fowner<'}}, {@uid_lt={'uid<', r2}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@appraise_type}, {@fsname={'fsname', 0x3d, '*+'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000480)='mnt/encrypted_dir\x00', 0xa800, 0x6c) 01:12:42 executing program 3: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd_index}, 0x8001) r4 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r4, 0x0) io_uring_enter(r4, 0x58ab, 0x0, 0x0, 0x0, 0x0) r5 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000240)='mnt/encrypted_dir\x00', 0x7, 0x2, &(0x7f0000000180)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x85}], 0x2800018, &(0x7f0000000680)=ANY=[@ANYRES32, @ANYRESDEC, @ANYRESDEC, @ANYBLOB="1ae0e8648100b1271b716685424656a327d1c9b81b1efd02e58239ba46ae82ab9e8586aad23076ed790ad83c23f53f231870c4af8b5aa8340d03d2d144e7858da5de8e227c528f88f61829d782c7f3a6a72b08163c2d3b5040dfb2136e1d0a11fe1eeea6542614222c8fb4dd2c9efb1f3a306e044d604cc4228f54c0", @ANYRES64, @ANYRESOCT]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) openat(r5, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x200002, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:42 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) faccessat2(r0, &(0x7f0000000280)='./mnt\x00', 0x98, 0x1100) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file1\x00', &(0x7f0000000200)=@random={'osx.', 'vfat\x00'}, &(0x7f0000000240)='vfat\x00', 0x5, 0x2) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1075.317589] loop1: detected capacity change from 0 to 41948160 [ 1075.361922] loop5: detected capacity change from 0 to 41948160 01:12:42 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) write$binfmt_elf64(r0, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x6b, 0x5a, 0x47, 0x80, 0x2, 0x0, 0x5b879db13cf38ab2, 0x7ff, 0x136, 0x40, 0x18e, 0x3, 0x1fcf, 0x38, 0x1, 0x91d2, 0x1, 0x8}, [{0x3, 0x3, 0x0, 0x800, 0x7, 0x0, 0x8}], "c6152337819886332abe4713f3b34a7b7b3377c689d4eb0bd8a0b12351830105a658f75a923b5a66f783c2b6d57b344e82eeac47bc013a2abb5e0c3dbbca2739ac6b86d9c895ae8177f610ea5f2327429d970b5ff7e38b26386ac6ab5cb2ffa877d78519744025", ['\x00', '\x00']}, 0x2df) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1075.374017] loop2: detected capacity change from 0 to 41948160 [ 1075.402375] loop4: detected capacity change from 0 to 41948160 [ 1075.406517] FAT-fs (loop2): Unrecognized mount option "ãÀÏEÒ©¡e×DÑïMälâEP#wý„CL¶ÜÁUuZ­u!}Ü¥»<Ýw±Aìèi€C&‘{Ò½ÚkçóUÄ(o¹Q1»{ý(L` ­èÿ{Κí [ 1075.406517] fKLÉåÛøm+«ôepð~¡ï)õŠnÄ|t¿ûU€C|<qÓ>K@2É [ 1075.406517] ëùC0ãI/Æîå×BñçuŒ7aßÊÜûhoÝ_+iòñ¶ñz¬…»û>åñ“úcÏ¡©s±€ì#&òºLxݳ]i2:md±$€ØHðˆ9ç" or missing value 01:12:42 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xffffffff}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000280), &(0x7f0000000140)) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r2 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000100)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd_index}, 0x8001) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[@ANYBLOB="3c4aa64c41e4cf537eefe2d11e9e7613af69db6ed3cd", @ANYRESHEX=r0, @ANYRES16=r5, @ANYRES64=r1]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) recvmmsg$unix(r6, &(0x7f0000003540)=[{{&(0x7f0000000440)=@abs, 0x6e, &(0x7f0000000600)=[{&(0x7f0000000500)=""/112, 0x70}, {&(0x7f0000000580)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000640)=""/214, 0xd6}, {&(0x7f0000000740)=""/8, 0x8}], 0x2, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}}, {{&(0x7f0000000800), 0x6e, &(0x7f0000000880)=[{&(0x7f0000000900)=""/252, 0xfc}, {&(0x7f0000000a00)=""/96, 0x60}], 0x2, &(0x7f0000000a80)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x88}}, {{&(0x7f0000000b40), 0x6e, &(0x7f0000000c80)=[{&(0x7f0000000bc0)=""/145, 0x91}], 0x1, &(0x7f0000000cc0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x110}}, {{&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000000e80)=""/84, 0x54}, {&(0x7f0000000f00)=""/234, 0xea}, {&(0x7f0000001000)=""/213, 0xd5}, {&(0x7f0000001100)=""/206, 0xce}, {&(0x7f0000001200)=""/27, 0x1b}, {&(0x7f0000001240)=""/51, 0x33}, {&(0x7f0000001280)=""/190, 0xbe}, {&(0x7f0000001340)=""/230, 0xe6}], 0x8, &(0x7f00000014c0)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xd0}}, {{&(0x7f00000015c0), 0x6e, &(0x7f0000001a00)=[{&(0x7f0000001640)=""/159, 0x9f}, {&(0x7f0000001700)=""/28, 0x1c}, {&(0x7f0000001740)=""/44, 0x2c}, {&(0x7f0000001780)=""/6, 0x6}, {&(0x7f00000017c0)=""/53, 0x35}, {&(0x7f0000001800)=""/171, 0xab}, {&(0x7f00000018c0)=""/239, 0xef}, {&(0x7f00000019c0)=""/28, 0x1c}], 0x8, &(0x7f0000001a80)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf0}}, {{&(0x7f0000001b80)=@abs, 0x6e, &(0x7f0000001c40)=[{&(0x7f0000001c00)=""/14, 0xe}], 0x1, &(0x7f0000001c80)=[@cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x188}}, {{0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e40)=""/159, 0x9f}, {&(0x7f0000001f00)=""/227, 0xe3}, {&(0x7f0000002000)=""/158, 0x9e}, {&(0x7f00000020c0)=""/58, 0x3a}], 0x4, &(0x7f0000002140)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000002180), 0x6e, &(0x7f0000003400)=[{&(0x7f0000002200)=""/45, 0x2d}, {&(0x7f0000002240)=""/241, 0xf1}, {&(0x7f0000002340)=""/9, 0x9}, {&(0x7f0000002380)=""/4096, 0x1000}, {&(0x7f0000003380)=""/69, 0x45}], 0x5, &(0x7f0000003480)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x98}}], 0x9, 0x40000022, &(0x7f0000003780)={0x77359400}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1075.524603] loop6: detected capacity change from 0 to 41948160 01:12:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x54, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x80000001}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x400}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="69bfbb407e82"}]}, 0x54}, 0x1, 0x0, 0x0, 0x4044085}, 0x40855) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:42 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)='mnt/encrypted_dir\x00', &(0x7f00000009c0), 0x2110810, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@loopback, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000000840)=0xe8) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000200)='./file0\x00', 0x1f, 0x5, &(0x7f00000006c0)=[{&(0x7f0000000240)="9b6db644ae67e2d0bb6888e671dadf35b457e00cea39c7aed7f04742e6f2817e2a466a7aed57399bbf9313b8cdee7c1607d01f8808f28a9b8ca28509b41584d997037f8b83338924722acdd88a9674b07539e8a9e19a4632e4990a234522d70fd6d31a84ab2ba62bf5834bf39686e6f13a6e5dcf1bef71f3fe986d562c3547c5fda9d83d94620ec36830afc79ba523b280d5bb20633ba34f2c686b780eaab399ee8dc1d9b32fab9f2d1ee432e924419cadd56909c2586d691af65960f79be1557c19bf054db4a2bc4c8f7ae673a1ee8b2f686d130712c0c8016a2ccdfede6b628d3e45a3e355b610270792dfc6353e82002403", 0xf3, 0xb4}, {&(0x7f0000000340)="472061b2e9f48c99337547b3649ffc2f16aff755cbd53884e50a48177504b02b4c699169b89c60ce5a1d85a4f068dbe78ea2b874d912468ffafe7a4b6ca3818eb482c0cf83a0c5c664a71e913ab1702d13fc2767f439fdfffde8fcafd2476fb95e2fdce9d8d8577704f6a38d2d00f9bbd1295c6360e86e19f6eb325daab76dbfae67aff0b3d929a72329f8f9f3100d4d3d74b6bc57ed1bf7c1d9f29fd3a0e19a69c76b67480c48ab1ca7d1b927551a4c", 0xb0, 0x8000}, {&(0x7f0000000400)="c93f8977976783a3a43dd84de546097562dd947d00e9c1260cbe19d7159ff22f0cfbb6b000daf662a619b514045378eba8c3e31a846c317357d6c5f4c998ac9b66176de6a23ce062b5e1853e015e2e9d105d502299442f5db2a63a7b7ea30e112986321287c63fcdadba564dae615ebc50d0f473280459a323efabdef9c1cc78ebab23c72380f086e382c42109d15552ae0d4e8f657e8cf85e09", 0x9a, 0x3}, {&(0x7f0000000500)="9eb22ce9fc8abde6efc2d4aa7dac66dfb8b7175b2ee1943e649041b8e442b0cca57b7e7443dfae53a787aaca635b703087f1f0be703bad2b7eb7c1d3613299adc5859c791ac162c14d4ebfd6789f2b4bfe64c9a1786b30de78e0a031b52a4563dab55231785f6f34ec4db7d8cc470841f4350dc28afd0a8a957746aab561f9e655db2dea5615f76dd2bbc2af5334543ecf64e65fc7759b86599a8bd024b7b38f", 0xa0, 0x10000}, {&(0x7f00000005c0)="c452b6a34bdb4606458bcbd52505a3518f5aa70b21870a7a78467cf93bca3f0822543a84f0c2b3e6d2c28d6e39e1bc39eabfbac268707d19d25e9ff503380e867de9239da4222ffcd32b59034625c46682e824ea83a56615db6c8615c5ac5911f257fa570d005953035229191239b53cba970c2f63b6aff72ebcc8867a4b25a71d2ca2873f5f357095e3595cd18266c7809af05a5e5aea7bf395714c24bd6dfa01578699c5d9b83f00370da62dbd89284287bdd6768728fad0ac395ad79a0dc850b8f8a8ba20e8f108b54bed4a89cc984c3526f2c2333a9e9fed7b813965b97a49517052d88bf1e049ec3a389489ad2a", 0xf0, 0x9}], 0x440, &(0x7f0000000880)={[{@nr_inodes={'nr_inodes', 0x3d, [0x25, 0x32, 0x39, 0x34, 0x67, 0x74]}}], [{@appraise_type}, {@permit_directio}, {@uid_lt={'uid<', r0}}, {@appraise_type}, {@audit}, {@euid_lt={'euid<', 0xee00}}, {@appraise_type}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1075.673105] loop5: detected capacity change from 0 to 41948160 01:12:42 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000200)='./mnt\x00', 0x1) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:42 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2900218, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat2(r0, &(0x7f0000000000)='./mnt\x00', &(0x7f0000000340)={0x208402, 0x1, 0x8}, 0x18) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000380)={0xffff160b, 0x7, 0xffff, 0xffffff81, 0x3}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c, 0x0) r3 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) io_uring_enter(r3, 0x58ab, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000003c0)=ANY=[@ANYBLOB="010000000100000018001100", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="000ab69e0601658b686e637279707465645f646972007d1f18b564a99da1304298b1c50d27a3859ae541029e2618df180a92a88899482fe23b245560de2e5a57ce86124ce297b4f2e5b977ce16aa695def41773ef7d882c99e82e6038a562d3ba544e26b1a0b7a48ed06781cd6cd7b635f60e7ad97ff22ed20b920e39d8bb16f2da7b2851a212f0ebdf657f06c5f032ed2d08a00"/157]) [ 1075.711295] FAT-fs (loop5): Unrecognized mount option "0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 52) 01:12:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x802, 0x88) openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x220800, 0x110) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./mnt\x00', 0x1a) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1075.789795] loop1: detected capacity change from 0 to 41948160 [ 1075.825507] loop5: detected capacity change from 0 to 41948160 [ 1075.828619] FAULT_INJECTION: forcing a failure. [ 1075.828619] name failslab, interval 1, probability 0, space 0, times 0 [ 1075.830569] CPU: 0 PID: 7942 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 1075.831735] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1075.833140] Call Trace: [ 1075.833601] dump_stack+0x107/0x167 [ 1075.834223] should_fail.cold+0x5/0xa [ 1075.834870] should_failslab+0x5/0x20 [ 1075.835513] __kmalloc_track_caller+0x79/0x370 [ 1075.836279] ? kstrdup_const+0x53/0x80 [ 1075.836942] ? kasprintf+0xbb/0xf0 [ 1075.837554] kstrdup+0x36/0x70 [ 1075.838091] kstrdup_const+0x53/0x80 [ 1075.838717] kmem_cache_create_usercopy+0x12f/0x2f0 [ 1075.839585] p9_client_create+0xc6a/0x1230 [ 1075.840316] ? p9_client_flush+0x430/0x430 [ 1075.841038] ? trace_hardirqs_on+0x5b/0x180 [ 1075.841788] ? lockdep_init_map_type+0x2c7/0x780 [ 1075.842599] ? __raw_spin_lock_init+0x36/0x110 [ 1075.843377] v9fs_session_init+0x1dd/0x1680 [ 1075.844109] ? lock_release+0x680/0x680 [ 1075.844781] ? kmem_cache_alloc_trace+0x151/0x320 [ 1075.845597] ? v9fs_show_options+0x690/0x690 [ 1075.846343] ? trace_hardirqs_on+0x5b/0x180 [ 1075.847065] ? kasan_unpoison_shadow+0x33/0x50 [ 1075.847838] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1075.848692] v9fs_mount+0x79/0x8f0 [ 1075.849299] ? v9fs_write_inode+0x60/0x60 [ 1075.849992] legacy_get_tree+0x105/0x220 [ 1075.850671] vfs_get_tree+0x8e/0x300 [ 1075.851296] path_mount+0x1490/0x21e0 [ 1075.851943] ? strncpy_from_user+0x9e/0x470 [ 1075.852674] ? finish_automount+0xa90/0xa90 [ 1075.853402] ? getname_flags.part.0+0x1dd/0x4f0 [ 1075.854173] ? _copy_from_user+0xfb/0x1b0 [ 1075.854878] __x64_sys_mount+0x282/0x300 [ 1075.855549] ? copy_mnt_ns+0xa00/0xa00 [ 1075.856198] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1075.857069] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1075.857939] do_syscall_64+0x33/0x40 [ 1075.858562] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1075.859421] RIP: 0033:0x7f42b2db2b19 [ 1075.860044] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1075.863351] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1075.864632] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 1075.865825] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1075.867012] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 1075.868201] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1075.869394] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 1075.870780] kmem_cache_create(9p-fcall-cache-94) failed with error -12 [ 1075.871970] CPU: 0 PID: 7942 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 1075.873169] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1075.874544] Call Trace: [ 1075.874979] dump_stack+0x107/0x167 [ 1075.875591] kmem_cache_create_usercopy.cold+0x17/0x65 [ 1075.876452] p9_client_create+0xc6a/0x1230 [ 1075.877160] ? p9_client_flush+0x430/0x430 [ 1075.877877] ? trace_hardirqs_on+0x5b/0x180 [ 1075.878585] ? lockdep_init_map_type+0x2c7/0x780 [ 1075.879379] ? __raw_spin_lock_init+0x36/0x110 [ 1075.880132] v9fs_session_init+0x1dd/0x1680 [ 1075.880838] ? lock_release+0x680/0x680 [ 1075.881506] ? kmem_cache_alloc_trace+0x151/0x320 [ 1075.882302] ? v9fs_show_options+0x690/0x690 [ 1075.883057] ? trace_hardirqs_on+0x5b/0x180 [ 1075.883759] ? kasan_unpoison_shadow+0x33/0x50 [ 1075.884503] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1075.885344] v9fs_mount+0x79/0x8f0 [ 1075.885934] ? v9fs_write_inode+0x60/0x60 [ 1075.886610] legacy_get_tree+0x105/0x220 [ 1075.887282] vfs_get_tree+0x8e/0x300 [ 1075.887890] path_mount+0x1490/0x21e0 [ 1075.888512] ? strncpy_from_user+0x9e/0x470 [ 1075.889232] ? finish_automount+0xa90/0xa90 [ 1075.889932] ? getname_flags.part.0+0x1dd/0x4f0 [ 1075.890710] ? _copy_from_user+0xfb/0x1b0 [ 1075.891387] __x64_sys_mount+0x282/0x300 [ 1075.892053] ? copy_mnt_ns+0xa00/0xa00 [ 1075.892702] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1075.893563] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1075.894406] do_syscall_64+0x33/0x40 [ 1075.895021] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1075.895854] RIP: 0033:0x7f42b2db2b19 [ 1075.896455] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1075.899460] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1075.900691] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 1075.901876] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1075.903054] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 1075.904228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1075.905402] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 1075.958124] loop4: detected capacity change from 0 to 41948160 [ 1075.963443] loop3: detected capacity change from 0 to 41948160 [ 1075.971258] loop6: detected capacity change from 0 to 41948160 [ 1075.982425] FAT-fs (loop6): Unrecognized mount option "›m¶D®gâлhˆæqÚß5´Wà ê9Ç®×ðGBæò~*FjzíW9›¿“¸Íî|ЈòŠ›Œ¢… ´„Ù—‹ƒ3‰$r*ÍØŠ–t°u9è©ášF2ä™ [ 1075.982425] #E"×ÖÓ„«+¦+õƒK󖆿ñ:n]Ïïqóþ˜mV" or missing value [ 1076.000714] loop4: detected capacity change from 0 to 41948160 [ 1076.036717] loop6: detected capacity change from 0 to 135266304 [ 1076.059321] FAT-fs (loop6): Unrecognized mount option "›m¶D®gâÐ" or missing value 01:12:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x5, 0x400000) chdir(&(0x7f0000000240)='mnt/encrypted_dir\x00') unlinkat(r0, &(0x7f0000000200)='./mnt\x00', 0x200) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') chroot(&(0x7f0000000280)='mnt/encrypted_dir\x00') 01:12:58 executing program 2: ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './mnt\x00'}) sendmsg$DEVLINK_CMD_RATE_DEL(r0, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)={0x154, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf7, 0xa8, @random="850cfefb18c0c02780cd83da21aa596a9e4c20cd6122931ccba410ddb7a4ab763fb59dcbaa4da2ac741d2b0ddccd95d1d641a98bb33c9216645ac55e3b31957da2fc9c3be872e7a7d73c41dc4f44caa5198f74c7a66fd0fe73bfb65417d759f354df1b3c7221864fb8dd662c89b33d7e28c0bf45833b9c98a9e9ceea9ea86ac0c80d6ce923a414cc61909a544b402089ce092cf425a3ad3e155f0dda4bf864f3999598c4dfe7ae9f61ef9083d6eddcc28c5896ba4c86fc890a856938872308a8efddc340d177ac47ee654e179506c2f2eeb9cb1f01343570f4a4653ae464dd145f7a28aa90e3199f2a1c5bbda48b0e4316dceb"}]}, 0x154}, 0x1, 0x0, 0x0, 0x1}, 0x48000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@loopback, @in=@private}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000640)=0xe8) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) syz_io_uring_submit(r4, r3, &(0x7f0000000100)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd_index}, 0x8001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r5, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000500)=@IORING_OP_SEND={0x1a, 0x4, 0x0, r5, 0x0, &(0x7f0000000440)="33c0f538913aad94b1b4d8de63d12ab5045e99d90a7f29e39c839a0079f380ce37ee89c90879f2ac3c6c6342cfb1ff4cf3ea0a286089815d35be07a6fae735f8e2306bfe4f846277c56517a6f7c4b2561308f0fdb66372ca11591d88ef33ef2d57ec105a0a806d9b48eaa6feae", 0x6d, 0x4000000, 0x1}, 0x9) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000001900), 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_LISTDEF(r6, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001980)={&(0x7f0000001940)={0x1c, r7, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x21}]}, 0x1c}}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x1c, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004050}, 0x800) 01:12:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000200), 0x5, 0x40000) mkdirat(r0, &(0x7f0000000000)='./file0/file0\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:58 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./mnt\x00') r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {r1}}, './mnt\x00'}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:58 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='./mnt\x00', &(0x7f00000001c0)='./file0\x00') 01:12:58 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 53) 01:12:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_open_dev$vcsa(&(0x7f0000000000), 0xffffffff80000001, 0x20080) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:12:58 executing program 6: r0 = syz_io_uring_setup(0x68d2, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') syz_io_uring_setup(0x1008, &(0x7f0000000740), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/locks\x00', 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r3, 0x80047213, &(0x7f0000000080)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd_index}, 0x8001) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xbf4b9c80fa303f3d, 0x50, r0, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x3, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./mnt\x00', 0x1, 0x2, &(0x7f0000000180)=[{&(0x7f0000000500)="eb3c906d6b66732e66617400020801000470008400f801868c668b1968e7c0f40b8969f86becb487a36a56c0212a9e3ad18616ed6eff2b0b5837b9634ae2b5052ae88a6b46ad0c67390b5913fe4482c7d067bf3112aa66786b6bea33976414ad4cfded05693c563fe0112bdb1aef16ff9d0a099d3a5886c5636f7cf82b9b9d31534217998262f3ba2b8e5e5db62f64e3713c1cb3a2ec8650777dc207fb9a56d7fce9ff217cd35f0caca7457d332b10b5e78ed25bfdc1a5393a9b50bec5428e43a0c388d8359b7f0a51de4067ef58045fbbc24a2a02aa67d940cce3cf45348e1a441a8ff3cc2250f69a1120573995fc1f13cae73d0824", 0xf6}, {0x0, 0x0, 0x1001000a00}], 0x2, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1091.113194] loop3: detected capacity change from 0 to 41948160 [ 1091.119221] FAULT_INJECTION: forcing a failure. [ 1091.119221] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.122141] CPU: 0 PID: 7974 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 1091.123818] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1091.125915] Call Trace: [ 1091.126581] dump_stack+0x107/0x167 [ 1091.127470] should_fail.cold+0x5/0xa [ 1091.128359] ? __kmem_cache_create+0x10e/0x520 [ 1091.129453] should_failslab+0x5/0x20 [ 1091.130337] kmem_cache_alloc_node+0x55/0x330 [ 1091.131376] __kmem_cache_create+0x10e/0x520 [ 1091.132413] kmem_cache_create_usercopy+0x1db/0x2f0 [ 1091.133591] p9_client_create+0xc6a/0x1230 [ 1091.134577] ? p9_client_flush+0x430/0x430 [ 1091.135550] ? trace_hardirqs_on+0x5b/0x180 [ 1091.136561] ? lockdep_init_map_type+0x2c7/0x780 [ 1091.137665] ? __raw_spin_lock_init+0x36/0x110 [ 1091.138722] v9fs_session_init+0x1dd/0x1680 [ 1091.139714] ? lock_release+0x680/0x680 [ 1091.140636] ? kmem_cache_alloc_trace+0x151/0x320 [ 1091.141753] ? v9fs_show_options+0x690/0x690 [ 1091.142775] ? trace_hardirqs_on+0x5b/0x180 [ 1091.143765] ? kasan_unpoison_shadow+0x33/0x50 [ 1091.144823] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1091.146000] v9fs_mount+0x79/0x8f0 [ 1091.146823] ? v9fs_write_inode+0x60/0x60 [ 1091.147772] legacy_get_tree+0x105/0x220 [ 1091.148708] vfs_get_tree+0x8e/0x300 [ 1091.149572] path_mount+0x1490/0x21e0 [ 1091.150459] ? strncpy_from_user+0x9e/0x470 [ 1091.151450] ? finish_automount+0xa90/0xa90 [ 1091.152441] ? getname_flags.part.0+0x1dd/0x4f0 [ 1091.153519] ? _copy_from_user+0xfb/0x1b0 [ 1091.154485] __x64_sys_mount+0x282/0x300 [ 1091.155414] ? copy_mnt_ns+0xa00/0xa00 [ 1091.156315] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1091.157532] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1091.158719] do_syscall_64+0x33/0x40 [ 1091.159577] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1091.160755] RIP: 0033:0x7f42b2db2b19 [ 1091.161522] loop2: detected capacity change from 0 to 135266304 [ 1091.161628] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1091.167194] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1091.168961] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 1091.170614] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1091.172259] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 1091.173912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1091.175583] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 1091.177430] kmem_cache_create(9p-fcall-cache-95) failed with error -22 01:12:58 executing program 7: syz_io_uring_setup(0x0, 0x0, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa44a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$netlink(0x10, 0x3, 0x2) ioctl$FIOCLEX(r0, 0x5451) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x24}}, 0x24000800) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(r2, 0x3, 0x0, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000200)=':\\,^\x00') r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x80030, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x0) ioctl$CDROMREADALL(0xffffffffffffffff, 0x5318, &(0x7f0000001a80)) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x200f5ef, 0x0) syz_io_uring_setup(0x65f8, &(0x7f0000000480)={0x0, 0x95fb, 0x4, 0x3, 0x8000be}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff7000/0x2000)=nil, &(0x7f0000000300), &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x80202, 0x100) sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="040827bd7000fedbdf0062620000080001006000000008009a0002e4c1e975d6305fa46a400000006004768fbbcfffad"], 0x34}, 0x1, 0x0, 0x0, 0x40040}, 0x2005c804) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x470240, 0x0) [ 1091.178995] CPU: 0 PID: 7974 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 1091.180792] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1091.182726] Call Trace: [ 1091.183341] dump_stack+0x107/0x167 [ 1091.184196] kmem_cache_create_usercopy.cold+0x17/0x65 [ 1091.185417] p9_client_create+0xc6a/0x1230 [ 1091.186401] ? p9_client_flush+0x430/0x430 [ 1091.187376] ? trace_hardirqs_on+0x5b/0x180 [ 1091.188385] ? lockdep_init_map_type+0x2c7/0x780 [ 1091.189535] ? __raw_spin_lock_init+0x36/0x110 [ 1091.190591] v9fs_session_init+0x1dd/0x1680 [ 1091.191582] ? lock_release+0x680/0x680 [ 1091.192517] ? kmem_cache_alloc_trace+0x151/0x320 [ 1091.193641] ? v9fs_show_options+0x690/0x690 [ 1091.194659] ? trace_hardirqs_on+0x5b/0x180 [ 1091.195661] ? kasan_unpoison_shadow+0x33/0x50 [ 1091.196725] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1091.197907] v9fs_mount+0x79/0x8f0 [ 1091.198725] ? v9fs_write_inode+0x60/0x60 [ 1091.199677] legacy_get_tree+0x105/0x220 [ 1091.200614] vfs_get_tree+0x8e/0x300 [ 1091.201490] path_mount+0x1490/0x21e0 [ 1091.202378] ? strncpy_from_user+0x9e/0x470 [ 1091.203401] ? finish_automount+0xa90/0xa90 [ 1091.204410] ? getname_flags.part.0+0x1dd/0x4f0 [ 1091.205579] ? _copy_from_user+0xfb/0x1b0 [ 1091.206578] __x64_sys_mount+0x282/0x300 [ 1091.207530] ? copy_mnt_ns+0xa00/0xa00 [ 1091.208443] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1091.209672] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1091.210869] do_syscall_64+0x33/0x40 [ 1091.211732] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1091.212921] RIP: 0033:0x7f42b2db2b19 [ 1091.213796] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1091.218161] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1091.220045] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 1091.221850] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1091.223640] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 1091.225431] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1091.227217] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 1091.261501] loop4: detected capacity change from 0 to 41948160 [ 1091.273447] loop1: detected capacity change from 0 to 41948160 [ 1091.283854] loop5: detected capacity change from 0 to 41948160 [ 1091.289558] FAT-fs (loop2): Unrecognized mount option "T" or missing value [ 1091.296904] loop6: detected capacity change from 0 to 41948160 [ 1091.311256] FAT-fs (loop5): Unrecognized mount option "mnt/encrypted_dir" or missing value [ 1091.373175] loop5: detected capacity change from 0 to 135266304 [ 1091.379233] FAT-fs (loop5): Unrecognized mount option "mnt/encr" or missing value [ 1091.406385] FAT-fs (loop6): count of clusters too big (8782078) [ 1091.407812] FAT-fs (loop6): Can't find a valid FAT filesystem [ 1091.458474] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1091.460083] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1091.461986] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 01:13:12 executing program 3: ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000006c0)="1329ca08a69472fe0ad9c6f477ae84292528059bd757a1306ceadbfef1acfcbe7875bd3ed51b07aa39ba5d2cc821c670626a316a1f70d7546f3d6e4256787c3bbda919b4420018148c7cbc1919bb6237d3f3d16f457078a0c7e8e536ec711cc59124e7671d29559a8e7369e85a5e8e69868f6266cc5ac5d8e9a4943ce0f99e6b124ac27970a56939b7100a1dab7c404cbc8d743a594f8e0bcf50af1f5e581fb5d95682b964dac4e22b8e46cb778d156fd58e088fea8aca3a0150b4385a745efd8b66253689210eb31f7649d8f5cd4e33546c7086d1c43ca5b79f803cff21aa9578a50bba061a755174c29b2c74c91ed3df38a22243be044de17e72db7fa19e825af5567700e4d0f9e624ed7bfe4532b256b16a55c496d5bace4f0fac661fddc66bf931e2f5a345e806bb1b888033f0e7cb6d4f302dc3f592655f2c6d2087a61d502a8a5814802bb0bf9300d7310d9e7f812fe2c3f63c53be89b687e38afa57113e8a03d35ef31e1c88d4095410005d77831f3f43a01abaa6edd52d8cd18a1fd9b45fe289610a58919e895f122cad0e1a60c7c020a5ce6069fe98b7f0244b3af22ab41e28ed461f43df35e56bbc45c2e9f62e699b3b7f37005d502331b42d4d856ff7d6150dde336788927e76a9972f1091850e4a11cb4231af0fe61ab64f4b4434a218d8548eeb74a657337b04751a383701d131607bfbd0a0fd8509d4d55a63d9f0bc1f65378262cf3ebfefba241dfd327a7cd032c93e2e9c0bfa33bd218e011e476add41a23e3294c3dcf39afb1a78efda492bd4499dec32250c51c4caf2653ba3e20b77999b5767b8bce0ed753371765a379fb7d6a55a00526b99b974f4b2a94c378957693b5e984fabfe910e247c3a4426db2aff248a0764d3fa000dbfd6ed405e145ea8c5f3614b02f6ae98fa8143e6c901f9385ec7cf0cccb68ba9e9ccc37a7b0321bee2ede6bab1d0ac86830ee5fb23639965e6e72cc46cd1dcd80a540edd9586c4901ac674c7397d904397d415d25da36fd2b61c0b1ccf5e704802415b53fe7ff07b05f941b92d9197f79c07d2a8dd7228e399bbc4557792d3232af48eb9bb360b255d265fe6c8fc96e9442ff1e27fa7a92f7184b383771a631821a96458b005f1407d5da5e6e3f0000c54e36d8fce3ba27d48f6d21500db144590921efa9450464a9b11afce51811be29ed29ddec526ca7ce67dd6d9933c818cf78e66ccd2388388d08c7fedcd69deeb264a6413a2fc1f2d230aaea7fc111e6ed490766c271b7f6fe72a4623ec532df1f48a433c718bd8543a2a538db8227e55b54bacce3fde8124e91e5acfe4fec32a286bfba63d723f747d6ba36e9d3ccb0397c299e9ce8156b7826ebb35197cd139508e734d2036a17f37079ba1530b08b01c4b33f75bbfadc86454a66a2ffb0c7e6263091b74a44d50e40392f9aa51ddd2e9c6bcf0d1cab8472678f0aac033d8960d2022f854f6b54326bb7782187d2ae46fb427c8f78d85dd96f91631fa21b19329b32e73a2c2d034712d6d8b01993f4c508885856822ca8ef1ee4d069005512f7dc894ef2bf5cb411b3b0e34d72656754578c35afd2a5d4cdfb6bc95c94e609f892a08e39c0401c2b76d9879208b8a6ced4592cef1e49e5e60b8ce8a9a960c38e7c36bbf97fc651c5c1a4f5374b11e2056302e2648e82474aca1e20f6da697b1c62ba6e36df7b5277fe971c5689d72b7ddd2b8333095db7bd215bb4e6c2f4af080d106bfc4f9817a428ad38f2f1a8a910f3dcfd2627fde667398539d9802a403326032fdf854f80c8f33617220baa5f54a26dd851e9562303dcbbe44ca56d760e0cec1e0536a309f2f523d5c7b9c0ce3eb1bfeb87f1987cf099a82b100a9c1c1b88487856b67603bfaa115e5906b6ab4d485062df2923dd62eb3e79a1d9891db54223162f890066349b643c59864297c230c814f26371a29687a22d7316e109ba5375a4201a75acfd0923a34b02d668149ee82b9e88d457f205c537b692197de4f5ad4600a9362e65432cdcf66afdc9dca05beff0fde46002d0ce8a1d48f93bdf3f40ef34d12640bf1837b764bef328e3f2df8791bf17f85b3fed73f2f4789980241e55a2f4fc3ff8681bcb7608b9e1f81f63d2eda446869a589adc0e35d0b7f1c537a405d3ad41991c6250bbf1657594ede2f71db7a79e12ae9024570e3e5cd6146cd1bf85e09df9ce1395c80965a6f2279b88f62aa22b30dea8756d94dd55d715f681eee2098bed7a53cd6bc0959de0deb7ce244192fc490a00c44e19ce9cc17dea17bd240e322d9c0ac91ecfa6b7aa11012032db0d82cdc396003f870fb369d4605d646db7a40e4dffd3a555c528050ccff52d08784f1c8e7c4355561c090347861257bb9c2b7ac8de85515a96de867d5e03c83d42154d5a2395ed5b7df59655ef5e9f5db1f613b3c41bfc82b05d836b64f0b1eab5f43c2ae1945c4ab8ebcb94810957d1db337f34b78f7cab9b477de940fd73eceae23b8550b574e6cc485e3ecb6d52a3f60c583f5dc2271017e62af4a7ac22882af81bb74d693b156c81d85f4c29c6891a1f8ca9caf6be3e29bc29f1979fdb0d3dadcf45830a68bca86db4129397d88e325643de17ab77164dee59b4031cb9ecd870b562b42d4d9600c8b3f3fe974373c25bef7f2122dff869234f3f463bf10347121ee980477e8c45b4c4963f0666e5d4f077f1a96dc9f0553e6519bfe84f0cdab84db6790fde4161d0b04d7516bb930c37e93decd54a0bf1595153ba554b7b990f06a932805eea684c10a9937d8cc89376a0a1867d1c2fe330266e6ae1b20100488dc5d13722ed9c7aa0f91f951b3787a30d6fce2c9722b2dd8aa3c01f923c39cd39346c7e219629804d1b2f51a6aa0b50356852471062a098f8aa1ecc6b371408ed16c96b1b204bf7156be3ec7d48d8ea00436ea2283e4e5084a7e6ddd8de81655f7a1dbdeb36d7b9d048573a94d73d3615db10f903229e908d27f5813c1f14dcbeeeba15d157ce3fa3915808e0672e619d27c3601eb30ba5a6a6eb1c5efb01e50a8fa378311e454f47ac00f5b1e1a130e0227f4840d42347dc601f3531190105df207716f297562c545bab9eda4888b8329173e4d063df42bf680b99684e8f4531e9f23aff1898c2d74b6b677959adc69b017241400592126d21d9c6589a5b614a46b1c6042bd34d1486bbdf4f79b51e967d99868cf805917770fe3c9d8376943179a31372b32bb61500b617db2e57a48617b9cdd8b864a00d9b2ef79ee8cf48aa58fe3f929e5846eee808be1a1d3d37bca122c5fddb7ddf527a6ca5c7234d0504f1d7cafce12a09f505b13ebfb411f09a16f99a59867e45932145cb278fb978bb669085efcf6aecdf48855835321b6d0c0ca0d125f93df9344b3d7a810b5f3a28da910e858b34e404f2c0a195690a9e9ec57661a66aca7f40df4bdc02ff9f7086633ce7f4f931d75a7ff7e7c3737f54e3f6cbee2d3075bfe05778558bb2c94e2ae6beb17ae13c9336ae0f5f0d2aaa7ec4531cd223584be8022d776c6ac06bbca01b58e0cd95ba56a89c3840ac2d9ac362e3b47bc6596a4856c47f0adc1a21f2c51f8d77c7fec8b5deec87a9cfa9bb6fc21e4efd1f740c8d19cf560183742d5e5dc8a818a840f485599118bbb0326f7ffa30d61a6f85de8eb559c9bacf1a65bafd9dd855a38a462ed8620f77dd4ed64a74c31e7eedbfbea4bdb525436af9715b2506952b308316bb60c272ec7522dfeed11dada0f890685396ee04e09f493af883c577cc0161e053651827bac359f56f8d978cb93cd3ebb99bebd0a98016ce5a08bc7361988e24aab7a819d0a34035a55b976c300a8399beff5ff123f6d8402e339e0c9d35eb702951386058bcaa245675ee56dd648696d33a21ca5e5a1f1fa4fe67db5de078a783840323395e1c014bef2f53a9b4f0dd96b6b7c16969bd3379e3d9faa7132c85bea40263495364d2648438f45ddb9731882dea75fff85eeefd59c4493e15b846e3c88536df5b313ac86fd009f82e3a5351a7236761561b93a9b6bbf6da3632c2e315712919347438fc388714654db91bbd9fc6aeacfb53e307b427e691221975c3a573cd0071b29e0762eec46dd3952324568fba01c5347b7a47df5d404f50e7473b9fac2f0dcc70f799b68b75978f4142cdc1cdeeee006efa516552799a56ddd0cf4d1a805d920768710256dcf806c3b7cbfd7331506cb8f10bec2d4c0f7570690784b8266612454c3ae47f228673e4a4648ea2e1641be44d2106ecec68a96a9bd60ac35fb754bdae7a64c981b8aae7e862dfef2638ed8c87af1c075892f6c82816aeaf84dce9021760afc817e798dc66161c57eefc1cb2fd5b42ea7f4f183a78362d49832aa2cdb34076967c96519049014ff1a1afb6fddae3b8b0d78dd8810bfddf74139ee0def69d6b37bd33908b29a7847bf5335676fe1bb5fedc54167efa9a27706e46b6b3b526031506153e968f930b7550749f10fbc00b076cbed82a8cc57f3b7a3434a475ab1de9bcc61def9ca1055a6b4963876e85721c3effedae19b4dd399b3db44ad3cd6fd4302948fb9b85e4808579deed3c7f063d87600ec2248a4ed9e864304b9a0eb99d15ec77c917571c75477fa10ac911a2b0709476c749cc9c49764b597b71d4bdb029b044530687a6b4437685beb65afdd6620fdd459f908ca082767e92e82f1b5c11ec3cb5c78817d2a66d1d1745a56d4d0e0367b22d9e76751499107328eba2105ef5d5fb7499f08b93a23a57bc2b1bc476e54de5245c24894fbda102ecfa475275c85b7f47c3bf48ddc0c26ac2d098124ad9b95f2f2c0acddf5a05cb0b270013da73859e9ce5101778cd35a41d796f312abe5c126f14c9dac081af6770cbd9f325a71239c1a02cd08185d7ee6b21a1e81fff98f0f51dca1e8eef726fbff599d769e81b9b4dd0538a34ef20bc0f0ba40106499f1c910f42e4f24817e6502b3364011c933328b43440af2cefba83695bf9dc76c3cf04b6f34b7313e098a48fad1847ffd5b9950b8a8b2786ba53dcd727375a709e151243923701e58dee2fc8a1dace68c395118d03ce00ff2f6f9ec44c576b875c95cd5c304e38b8a269423a249fc371f80c16bc4157d9308d6da43fd89e88f86061c18f6d4032f85fd8c220e49d7d21cd3657f43b5ac23d4a38b208f1afe57c908385e6633415c6d2e9db6298b009d3b62f654b83f9c9ec1d03164e018f52e2ae0dc4ca3ea3421b8ae8e4841fdbd78c5ea523bf066b8a878f7a5b298cb1810e281e27a124307f7254de7bd6595f1bb07ab2a87999cf51e566607b75f4762b705716357540c1c0eba2d5d20210ba1644e02ebf9c749359915913b65b22a022d9371ff897efae84d3d15565914318cffa5660601a016e84e69b5f1e169bdc1825adef7e724515c8ebc19e114cbb6760a36c299b06d427b0e0d2ba6d25f6293acd3af81f5056ec32413ac96e58616243e35063fcd9c187bde9c37b8af4ea95344a4931d8b305c7a332bbff3251eff24ecd5b76e97833b0b6b8b71633cff756ad5a775cc6d4a4cdc130d02257cd55138c1232680b9db9099132de188f48af96c36185d3cddbb0a882ea6f35eec86e608528de22a7b545d2457c634704004896c1157172f1483856293b8a6c64a27c0289dc7d6fd1d6ea020131dd17af03f89438c51fa9eea347691957b061878b89cee9b11ef40b459cc98ef69fb05f41434b7862675f33897735250908c9ef905e5847350308c0157871346cb23c770779630858fb4b7e2a38905e07565b54b7fdf5c433c0ebcfc1fc7") syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000380)={0x24, &(0x7f0000000200)={0x40, 0x8, 0xe3, {0xe3, 0x3, "0d1c1d0b7101754b3852e1a91d0dda61f2a5019f03f1ddfe0b008e9b1406523b909422c3323be9a0afc43f7ace102a56292938f6e9f0410f6239a3d5e8389151537f02bcd2a10c20435abebfd8500ea71c9a3dfc617cf0c02ef824c1a0a15323df56818d4082705b7c4cd489ec6a63dfa759fd9d7ffb821a336121b91b922547ad0723516ce62c7cf014f92dba044901048ec87d306aca80e2d47dea87499836417061ec45022944f53717c4737727b4d7795330ed2684966deb2f04b83351cb6c871348897afee4c755b282be46f3f1d13d22aa8c19ffb0bbbeceaca8680be60e"}}, &(0x7f0000000640)={0x0, 0x3, 0x21, @string={0x21, 0x3, "e691cc4adc167171a8a29bfa8c6aa9981600"/31}}, &(0x7f0000000000)={0x0, 0x22, 0x8, {[@main=@item_012={0x0, 0x0, 0xa}, @global=@item_012={0x1, 0x1, 0x0, '$'}, @main=@item_4={0x3, 0x0, 0xc, "8ce3ee94"}]}}, &(0x7f0000000340)={0x0, 0x21, 0x9, {0x9, 0x21, 0x0, 0xb0, 0x1, {0x22, 0xa34}}}}, &(0x7f0000000480)={0x2c, &(0x7f0000000500)={0x40, 0x18, 0xff, "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"}, &(0x7f00000003c0)={0x0, 0xa, 0x1, 0x9}, &(0x7f0000000400)={0x0, 0x8, 0x1}, &(0x7f0000000440)={0x20, 0x1, 0x38, "90b4b2ecd0b4d46694bb9ce76ac941551319811a5d3b7b2594ebe8b6bf700022480d7ef3a99c4d902dc2703cbab294f9a825db412122fbf0"}, &(0x7f0000000680)={0x20, 0x3, 0x1, 0x5}}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x80080, 0x40) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1105.589222] loop6: detected capacity change from 0 to 41948160 01:13:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x100000, 0x2, &(0x7f0000000400)=[{&(0x7f0000000500)="eb3c906d6b66732e6661740002080100047000b6d1a68400f8014bab7f87cf9ad15a1c80ab90fee86c856954bd5ac4cabe8838231b8bd2b70bb23cd98aca1980d404e54418d634e3acab960808389c19ea5b721da70749a79eb502c910a313770d898de1ecaefd1d5ac29f61da0fa2db277052bcedf048134c91c3de64a2580d0302c9ecc157f338b2ae7993781f87b04d1c393373a0b1896464c37eccb11e5e61f2b4f9d65e2a0c4d277c67fa6391247d03a5c36abb5ae8db4e2124834dc90d1452656e3c16", 0xc6}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = syz_io_uring_setup(0x204d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000003c0), 0x20201, 0x0) truncate(&(0x7f0000000440)='mnt/encrypted_dir\x00', 0x6) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000340)='\'\x00', &(0x7f0000000380)='./mnt\x00', r1) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000400), 0x0, 0x9, 0x5) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r2, 0x0) openat(r2, &(0x7f0000000240)='mnt/encrypted_dir\x00', 0x0, 0x81) syz_io_uring_setup(0x5ccc, &(0x7f0000000740)={0x0, 0x7372, 0x11, 0x3, 0x2c0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000280), &(0x7f0000000480)) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000880)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000001000010000000000000000000000000000180a01010000000000000000010000090900010073797a30000000000900010073797a31000000001c000000050a000700000000000000000c00000708000540fffffffe140000001100010000000000000000000000000a000000"], 0x70}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000000) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(0xffffffffffffffff, 0x8040942d, &(0x7f0000000640)) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x400, 0x43, 0x100000000}) syz_mount_image$ext4(0x0, &(0x7f0000000600)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:13:12 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x2}], 0x2800018, &(0x7f0000000240)=ANY=[]) r1 = creat(&(0x7f0000000000)='mnt/encrypted_dir\x00', 0x21) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r0}}, 'mnt/encrypted_dir\x00'}) r3 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) io_uring_enter(r3, 0x58ab, 0x0, 0x0, 0x0, 0x0) preadv(r3, &(0x7f0000000400)=[{&(0x7f0000000240)=""/67, 0x43}, {&(0x7f0000000340)=""/142, 0x8e}, {&(0x7f0000000500)=""/235, 0xeb}], 0x3, 0x401, 0x7) r4 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0xffffffff}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r4, 0x0) io_uring_enter(r4, 0x58ab, 0x0, 0x0, 0x0, 0x0) dup2(r2, r4) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:13:12 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000940), &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000140)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r3, 0x0}, 0x0) r4 = openat$cgroup_subtree(r0, &(0x7f0000000100), 0x2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_READ_FIXED={0x4, 0x6, 0x2007, @fd, 0xfffffffffffffffd, 0x2, 0x23d2, 0x0, 0x1}, 0xff) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000140)=@IORING_OP_FADVISE={0x18, 0x1, 0x0, @fd=r4, 0x4f, 0x0, 0x5, 0x3, 0x0, {0x0, r5}}, 0x8) r6 = socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) dup2(r0, r6) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) clock_gettime(0x0, &(0x7f0000000280)) fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r6, &(0x7f0000000200)={'#! ', './file0', [{0x20, 'iso9660\x00'}, {0x20, 'security.capability\x00'}], 0xa, "89e9acfbd22beca3a183337876994074620f635eac3efa8ed49fab22d831e4c0c6507fdae851da3b3bf487b56264b92e8b0192191c071ece6aa0deeb52320d423e9c684d349b7f2a0d54ed0d4ee6f2807e"}, 0x7a) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r7, &(0x7f0000002040)=ANY=[@ANYBLOB="7f454c4600000007000000000000000003003e000000000000000900000000000000008aea00000000000000000000000000000000003800020000000000000003"], 0xaf2) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x9, 0x7, 0xe1, 0x3, 0x0, 0xbb, 0x10000, 0xe, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xcd01, 0x1, @perf_config_ext={0x5, 0x7}, 0x40204, 0x0, 0x2, 0x6, 0x1f, 0x5, 0x0, 0x0, 0xfffff000, 0x0, 0x7fff}, 0x0, 0x4, r7, 0x1) 01:13:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000000)=ANY=[@ANYRES16, @ANYRESOCT]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:13:12 executing program 2: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)=0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000300)={'#! ', 'mnt/encrypted_dir', [{0x20, '.+'}, {0x20, 'dont_appraise'}, {0x20, '@^,-]k\\}*]\\)%'}, {0x20, '\'-*\'\\...\\}$x'}, {0x20, '/'}, {}], 0xa, "25f94f017ab3d3ae0eabaeb91bbca1bfe54d68ac0aba2fecec9d52dc7aeb22c7130f512af3f7723a82e7b3dd6ac60c667af99350cceacf816ac710c7bf3e8d24f10616e04769ab24b0efe71181e9afdba62c0867e52b521116978311f616987ebeac4d2c9df201f5f98e1b85c4fb228e9fdd1c84087890319140eaa87f762da75003114f654f"}, 0xca) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) io_uring_setup(0x5f30, &(0x7f0000000500)={0x0, 0x40ce, 0x4, 0x1, 0x1b7, 0x0, r0}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_submit(r4, r1, &(0x7f00000005c0)=@IORING_OP_OPENAT2={0x1c, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000480)={0x100, 0x42}, &(0x7f0000000580)='\x00', 0x18, 0x0, 0x12345}, 0x4) setresuid(0xffffffffffffffff, r3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./mnt\x00', &(0x7f0000000200), 0x20, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@access_any}, {@access_any}, {@fscache}, {@dfltgid}], [{@dont_appraise}, {@fowner_gt={'fowner>', r2}}, {@uid_eq={'uid', 0x3d, r3}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') rename(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='./file0\x00') 01:13:12 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 54) 01:13:12 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) openat(r0, &(0x7f0000000340)='./mnt\x00', 0x1a1200, 0x2) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_unix(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000200)='./mnt\x00', &(0x7f0000000240), 0x40, &(0x7f0000000280)={'trans=unix,', {[{@debug={'debug', 0x3d, 0x400}}, {@loose}, {@dfltuid={'dfltuid', 0x3d, 0xee01}}, {@nodevmap}], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@fsmagic={'fsmagic', 0x3d, 0x726}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x37, 0x39, 0x64, 0x35, 0x63, 0x0, 0x65], 0x2d, [0x39, 0x35, 0x32], 0x2d, [0x30, 0x64, 0x32, 0x34], 0x2d, [0x39, 0x66, 0x35, 0x61], 0x2d, [0x34, 0x36, 0x36, 0x32, 0x38, 0xf2, 0x31, 0x65]}}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1105.600995] 9pnet: p9_fd_create_unix (8013): problem connecting socket: ./mnt: -111 [ 1105.623465] 9pnet: p9_fd_create_unix (8013): problem connecting socket: ./mnt: -111 [ 1105.628490] loop3: detected capacity change from 0 to 135266304 [ 1105.633052] FAULT_INJECTION: forcing a failure. [ 1105.633052] name failslab, interval 1, probability 0, space 0, times 0 [ 1105.634448] CPU: 1 PID: 8015 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 1105.635283] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1105.636296] Call Trace: [ 1105.636624] dump_stack+0x107/0x167 [ 1105.637078] should_fail.cold+0x5/0xa [ 1105.637552] ? __kmem_cache_create+0x10e/0x520 [ 1105.638092] should_failslab+0x5/0x20 [ 1105.638555] kmem_cache_alloc_node+0x55/0x330 [ 1105.639083] __kmem_cache_create+0x10e/0x520 [ 1105.639629] kmem_cache_create_usercopy+0x1db/0x2f0 [ 1105.640245] p9_client_create+0xc6a/0x1230 [ 1105.640771] ? p9_client_flush+0x430/0x430 [ 1105.641291] ? trace_hardirqs_on+0x5b/0x180 [ 1105.641832] ? lockdep_init_map_type+0x2c7/0x780 [ 1105.642387] ? __raw_spin_lock_init+0x36/0x110 [ 1105.642973] v9fs_session_init+0x1dd/0x1680 [ 1105.643518] ? lock_release+0x680/0x680 [ 1105.643994] ? kmem_cache_alloc_trace+0x151/0x320 [ 1105.644598] ? v9fs_show_options+0x690/0x690 [ 1105.645164] ? trace_hardirqs_on+0x5b/0x180 [ 1105.645720] ? kasan_unpoison_shadow+0x33/0x50 [ 1105.646296] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1105.646883] v9fs_mount+0x79/0x8f0 [ 1105.647328] ? v9fs_write_inode+0x60/0x60 [ 1105.647814] legacy_get_tree+0x105/0x220 [ 1105.648321] vfs_get_tree+0x8e/0x300 [ 1105.648794] path_mount+0x1490/0x21e0 [ 1105.649110] FAT-fs (loop3): Unrecognized mount option "b9£Õè8‘Q" or missing value [ 1105.649249] ? strncpy_from_user+0x9e/0x470 [ 1105.651605] ? finish_automount+0xa90/0xa90 [ 1105.652154] ? getname_flags.part.0+0x1dd/0x4f0 [ 1105.652741] ? _copy_from_user+0xfb/0x1b0 [ 1105.653266] __x64_sys_mount+0x282/0x300 [ 1105.653788] ? copy_mnt_ns+0xa00/0xa00 [ 1105.654278] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1105.654949] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1105.655542] do_syscall_64+0x33/0x40 [ 1105.656016] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1105.656611] RIP: 0033:0x7f42b2db2b19 [ 1105.657088] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1105.659217] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1105.660182] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 1105.661079] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1105.661985] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 1105.662879] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1105.663776] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 1105.664813] kmem_cache_create(9p-fcall-cache-96) failed with error -22 [ 1105.665648] CPU: 1 PID: 8015 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 1105.666502] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1105.667538] Call Trace: [ 1105.667865] dump_stack+0x107/0x167 [ 1105.668320] kmem_cache_create_usercopy.cold+0x17/0x65 [ 1105.668978] p9_client_create+0xc6a/0x1230 [ 1105.669513] ? p9_client_flush+0x430/0x430 [ 1105.670053] ? trace_hardirqs_on+0x5b/0x180 [ 1105.670593] ? lockdep_init_map_type+0x2c7/0x780 [ 1105.671184] ? __raw_spin_lock_init+0x36/0x110 [ 1105.671764] v9fs_session_init+0x1dd/0x1680 [ 1105.672301] ? lock_release+0x680/0x680 [ 1105.672807] ? kmem_cache_alloc_trace+0x151/0x320 [ 1105.673405] ? v9fs_show_options+0x690/0x690 [ 1105.673973] ? trace_hardirqs_on+0x5b/0x180 [ 1105.674507] ? kasan_unpoison_shadow+0x33/0x50 [ 1105.675081] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1105.675710] v9fs_mount+0x79/0x8f0 [ 1105.676158] ? v9fs_write_inode+0x60/0x60 [ 1105.676672] legacy_get_tree+0x105/0x220 [ 1105.677179] vfs_get_tree+0x8e/0x300 [ 1105.677653] path_mount+0x1490/0x21e0 [ 1105.678133] ? strncpy_from_user+0x9e/0x470 [ 1105.678674] ? finish_automount+0xa90/0xa90 [ 1105.679210] ? getname_flags.part.0+0x1dd/0x4f0 [ 1105.679793] ? _copy_from_user+0xfb/0x1b0 [ 1105.680313] __x64_sys_mount+0x282/0x300 [ 1105.680819] ? copy_mnt_ns+0xa00/0xa00 [ 1105.681305] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1105.681969] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1105.682618] do_syscall_64+0x33/0x40 [ 1105.683079] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1105.683713] RIP: 0033:0x7f42b2db2b19 [ 1105.684175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1105.686471] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1105.687341] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 1105.688228] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1105.689041] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 1105.689939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1105.690836] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 1105.695069] loop1: detected capacity change from 0 to 41948160 [ 1105.753653] loop2: detected capacity change from 0 to 41948160 [ 1105.766429] loop4: detected capacity change from 0 to 41948160 [ 1105.780018] FAT-fs (loop1): Unrecognized mount option "ÿÿ01777777777777777777777" or missing value 01:13:12 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 55) [ 1105.836005] FAULT_INJECTION: forcing a failure. [ 1105.836005] name failslab, interval 1, probability 0, space 0, times 0 [ 1105.837497] CPU: 1 PID: 8047 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 1105.838319] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1105.839288] Call Trace: [ 1105.839596] dump_stack+0x107/0x167 [ 1105.840024] should_fail.cold+0x5/0xa [ 1105.840473] ? create_object.isra.0+0x3a/0xa30 [ 1105.841010] should_failslab+0x5/0x20 [ 1105.841454] kmem_cache_alloc+0x5b/0x310 [ 1105.841946] create_object.isra.0+0x3a/0xa30 [ 1105.842462] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1105.843051] kmem_cache_alloc_node+0x169/0x330 [ 1105.843590] __kmem_cache_create+0x10e/0x520 [ 1105.844113] kmem_cache_create_usercopy+0x1db/0x2f0 [ 1105.844707] p9_client_create+0xc6a/0x1230 [ 1105.845211] ? p9_client_flush+0x430/0x430 [ 1105.845717] ? trace_hardirqs_on+0x5b/0x180 [ 1105.846229] ? lockdep_init_map_type+0x2c7/0x780 [ 1105.846787] ? __raw_spin_lock_init+0x36/0x110 [ 1105.847329] v9fs_session_init+0x1dd/0x1680 [ 1105.847838] ? lock_release+0x680/0x680 [ 1105.848309] ? kmem_cache_alloc_trace+0x151/0x320 [ 1105.848877] ? v9fs_show_options+0x690/0x690 [ 1105.849398] ? trace_hardirqs_on+0x5b/0x180 [ 1105.849916] ? kasan_unpoison_shadow+0x33/0x50 [ 1105.850448] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1105.851049] v9fs_mount+0x79/0x8f0 [ 1105.851470] ? v9fs_write_inode+0x60/0x60 [ 1105.851957] legacy_get_tree+0x105/0x220 [ 1105.852433] vfs_get_tree+0x8e/0x300 [ 1105.852874] path_mount+0x1490/0x21e0 [ 1105.853329] ? strncpy_from_user+0x9e/0x470 [ 1105.853848] ? finish_automount+0xa90/0xa90 [ 1105.854361] ? getname_flags.part.0+0x1dd/0x4f0 [ 1105.854908] ? _copy_from_user+0xfb/0x1b0 [ 1105.855396] __x64_sys_mount+0x282/0x300 [ 1105.855873] ? copy_mnt_ns+0xa00/0xa00 [ 1105.856334] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1105.856953] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1105.857575] do_syscall_64+0x33/0x40 [ 1105.858015] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1105.858617] RIP: 0033:0x7f42b2db2b19 [ 1105.859058] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1105.861221] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1105.862106] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 1105.862926] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1105.863748] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 1105.864562] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1105.865381] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 1105.866628] FAT-fs (loop5): bogus number of reserved sectors [ 1105.868206] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1105.940819] FAT-fs (loop5): bogus number of reserved sectors [ 1105.942274] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1106.280375] loop3: detected capacity change from 0 to 135266304 [ 1106.286304] FAT-fs (loop3): Unrecognized mount option "b9£Õè8‘Q" or missing value 01:13:27 executing program 6: syz_mount_image$vfat(&(0x7f0000000140), &(0x7f00000000c0)='./file0\x00', 0x8000, 0x2, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x100000001}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1120.821666] loop6: detected capacity change from 0 to 135266304 [ 1120.828162] FAT-fs (loop6): bogus number of reserved sectors [ 1120.829537] FAT-fs (loop6): Can't find a valid FAT filesystem 01:13:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') listxattr(&(0x7f0000000240)='./mnt\x00', &(0x7f0000000380)=""/164, 0xa4) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000340)=0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @remote}}, 0x0) io_uring_enter(r0, 0x76d2, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r4 = syz_open_dev$mouse(&(0x7f0000000000), 0x2, 0x183040) fchmodat(r4, &(0x7f0000000200)='mnt/encrypted_dir\x00', 0x81) 01:13:27 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="2f64651f086e62643000"], &(0x7f0000000440)='./file1\x00', &(0x7f0000000480)='ocfs2_dlmfs\x00', 0x8520c0, 0x0) r1 = openat(r0, &(0x7f0000000000)='./file1\x00', 0x400, 0x157) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r2 = open(&(0x7f0000000600)='./file0\x00', 0x44140, 0x112) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000640)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) fchmodat(r1, &(0x7f0000000200)='./mnt\x00', 0x9a) mount$9p_tcp(&(0x7f0000000240), &(0x7f0000000280)='mnt/encrypted_dir\x00', &(0x7f00000002c0), 0x10c0000, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@afid={'afid', 0x3d, 0x400}}], [{@defcontext={'defcontext', 0x3d, 'root'}}]}}) setxattr$incfs_metadata(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0), &(0x7f0000000500)="5c88e4bc9673c930a8363644c656642618f2a500356451b0fc8d41bb88a37c3f277eef474e5629d0155365ac6bf991aecb197cee3ce39f8ded519ef84347f2d1ac7c7178b0e49e4f1bca47353e36c51df567f532aa9e455e7e3993b3e12d0569523831b93c507e98a85c477d1d1492e19761b49f6611093bd65a7cf89d2ba7f5406a13e7fa9ad714577b8ec8d8e1840ccd08cddf8fb9c0225d9da77515f75d312382f78027f2c6eaa3b370d908e9704355842f962408278f7191ffba7c591c0f9edef167d649ea3502668ff040ce51ed582fa690ee940b6d4f6f7ba1", 0xdc, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:13:27 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x101020, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0xffffffff}}, './file0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = getuid() stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='mnt/encrypted_dir/file0\x00', &(0x7f0000000280), 0x2100010, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@posixacl}, {@access_client}], [{@uid_lt={'uid<', r2}}, {@smackfsdef={'smackfsdef', 0x3d, ']\':m'}}, {@fowner_gt={'fowner>', r3}}, {@measure}, {@subj_role={'subj_role', 0x3d, '\\$'}}]}}) 01:13:27 executing program 7: r0 = syz_io_uring_setup(0x68d2, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') syz_io_uring_setup(0x1008, &(0x7f0000000740), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/locks\x00', 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r3, 0x80047213, &(0x7f0000000080)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd_index}, 0x8001) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xbf4b9c80fa303f3d, 0x50, r0, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x3, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./mnt\x00', 0x1, 0x2, &(0x7f0000000180)=[{&(0x7f0000000500)="eb3c906d6b66732e66617400020801000470008400f801868c668b1968e7c0f40b8969f86becb487a36a56c0212a9e3ad18616ed6eff2b0b5837b9634ae2b5052ae88a6b46ad0c67390b5913fe4482c7d067bf3112aa66786b6bea33976414ad4cfded05693c563fe0112bdb1aef16ff9d0a099d3a5886c5636f7cf82b9b9d31534217998262f3ba2b8e5e5db62f64e3713c1cb3a2ec8650777dc207fb9a56d7fce9ff217cd35f0caca7457d332b10b5e78ed25bfdc1a5393a9b50bec5428e43a0c388d8359b7f0a51de4067ef58045fbbc24a2a02aa67d940cce3cf45348e1a441a8ff3cc2250f69a1120573995fc1f13cae73d0824", 0xf6}, {0x0, 0x0, 0x1001000a00}], 0x2, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:13:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) unlink(&(0x7f0000000240)='./file0\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x2, 0x5}}, 'mnt/encrypted_dir\x00'}) 01:13:27 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 56) 01:13:27 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[@ANYRES64, @ANYRES16=r0, @ANYRESHEX, @ANYRES32=r1, @ANYRES16, @ANYRESDEC=r1, @ANYRESHEX, @ANYRES32=0x0, @ANYRESDEC=r2]) chdir(&(0x7f0000000040)='./file0\x00') ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f0000000400)={{'\x00', 0x3}, {0x5}, 0x16c, 0x0, 0x0, &(0x7f0000000340)='mnt/encrypted_dir\x00', &(0x7f0000000380)='./mnt\x00', &(0x7f00000003c0)="6c2750f1ed6bd89a7483963d9a30b89c2e1da8fcd65a4f1a94747cdbcb1007db3ce8", 0x22, 0x0, &(0x7f0000000500)={0x2, 0x1067, {0x0, 0xc, 0x1000, "3b1b6dc9a3c2e050b52058643a453440ba8944a1584882d3f2745e15c07adc50248c856cff79ebfdbea5bbd8b0ae531e0d98aa3d432d9be1dda5ddd2654cb08962ed9058eabd7702ecfda447a70e42068e79d217fbbe16e418d94f290f28c1d7da94813092bedf32b4f813a865ee74c2531f08e2f8c1dda18effafb1c7a12c6a17f0e05d38e9c7c1aac85b02ea12d618c287a8966ecdf80bc6d7848bba2148c0f9568d0f2a99c6fb087908856fe30dd37f7f6576fb270317a184afb5cccac17ceee9c5105b14a3885c0f5eae3b0d43ced9b9b78675564610661c9e482f0136d758a633b7656118d0448ba51f0248e55dd5d14f081cf2e834c7535cca9344904486b66c4a8a7fd8bc0770b53314c4d3df612cb8c14001b5ec00e7aeea897a2797a7d4cc88af86ef8034b535ffd3f400da1d20d37be61439d0d31fc3b3d8d953718638e170dd087dc4e4d86b4e3f0ebdcbe90234e14ecec0a9cc6520bca2c91de228ac5812df3423721f74914b63990968e534faf9f8e9baf866353d44db5777cf3385aedf2a6c9060515169d487a8b8d38a269cdd83f13440a39154652cd4012d8e89b0cb7b875224b13dfa71e7b4f59c548f83be409c34763cdace4b30ae91fc9cce73358acf91e2dbff7baca22381c8111c58b267ff1f7ef19243757f147b8ce53940632e3a9727877f87fece87f11663373a7aa356e6d2f3a08dcaca83ae007c6bdfc93684ba821c189bff99df129bb15cfb838a5e1b746e4c52dfc8d7fe79d5a77a8095b079192f3f02d17be3830105f0f5b8d85ff316d026a2a0d86e6883715abb043483425679cff51d02f26dc7ee6203f277b845669988ede6a8541ff9e657cbd8a32e1f76ca24c95b02d70ad86c6d4eb05a610816e67e8a51c63fe92ef56aa1f972e4e7789d220eeef32e768567ddc2f20cc54e6e062f24ce2038311ac01a7f869afbf3213d47d9fb746eda8fa760a0ac89916b6bfd00660999a98bcf31d5c0167d20cee86f50823439a570e41ca4b06bf767701fe18ab1434ece8d99b9f27a909b2fc0c9464d942e87552c3e148ecfaf3027455efe0c0a41201747eb6cf14665146952ef4bfb25fdadd7562e7fe2e2daf03a9c5b06cbce67c95a5c0185776c56972de77784ccfb8ded0ca6d7328d2df0d7dbc0df36ce8732d2b2badca738a85b1af13037a27546a4e8becb3d55c162d8f71cb80aaad69989629236f47e5bad8e7150744cd64fbb01aa7b3480269e190cd9581a1f5d790f52d52a6eb1ac38f6fd364ae13ccc1b7e5e45c61a064fc8e6870eacb5ba9861d5e6c746a0fdbd494da0fb8a8a3246727d63ddde031a1cf5fbcd555ba5c0865d047bc59251033c007280e0ad038be08e4ccaa2a31271032ccfb9ff3718351dac955e8bb074a36acb84dbd887c8c2714a5f38eb07a117bf55d0fe82d06f635b9bb2c0028883bbc8c4594a36834bf79cf97df2f615b49c7bf0af870148e08fc91a4755ab3fd3f3fcf3176ca9821c775a8278708b4b236d1edd29d455b6acd909c8427aa269998c1173f05c2a6f02475ebdcc56bac4c81e14e2b34bb200c323d82f40102897be48a9358a985cb19ed52245d53268742ee8507ade38ed8cc4e399292f83d9a9f50928a01faebc52724a5e604a8a36592b73a1a2f1cf5d2a61b1636ebb56ccae4a8b610acd1a0b50032e898e7ed7d9350e8f60c13bc45840f124ba335826b7fdd7e972e8cd9ffc74d16fe54fb80652d06abd718ab0cde1e8c4e9096ae0130a8cd107dba426429de6b0b5572c9b888d0235dc802dbd90a126f6cff1951980711c2162323fdc6bf975f1acab3496262fdc182b1b6970e3dba1ee48f70302169c82e4e6713b062ca7d03050df4c4e80fa1b24f098ad5e0fd41aa2fe010cc5c73e18e4dd5f986ec4031680f3279df6c9d0cea7ad1ae022218370cd015369ffed6d01af350f5b47c8b504f00e1ffe2ceee87fc53e2b8b0f7bd2f80da5a0f0ad9f8dc476b35fbdd07666d40448b095b61c907f8128965691f68a7c32a818e6931d3df136d3ac49fe0bc08d610327a913a31497eca04cc4e2c437c35bad042317e16a10298deb0d4fad14cd8dc774753502a2ec7efe888bf4a7f816942fe8f4a28e31c08117f56788e718c325900587c826d9249320cfc22c34ee52a148162c1363cf2efff325cecdb81b2c583d416ff9f75e74373d572e0c31c69e36780aafaf5cb980e0542b8ee95190df2ccfd744cda5b9aef3e81241f40664bf054efd75aada316fbf8ebb1c8937969ddc13486145b0cedf30a3322f97f094737adb8ed95ef952538a6f72732a59a4ce6769fad15bf502219e2a25bfe249109693b9296653d72dbc72c13143f8b9fdef6f6827196038eab03294908892262d12ae0d11f20f59852a0c929b87b2bc658dc49066e53d4de106104ab56095b00c83b03a3368ba3b3bd3df95d5d75c3f75d6987df2da56805698f87a07ca453d39d9b126f1a3f90eac97f5a69ea73ab0fa6a61f390337fd9e75c3423b9e636e511797489fec0de95d424b0f42b9ddd3785f1812bd79504ec98ddbd60b4619326f80c5013709995b1f4365da92625cd08a6980e1bc8c3b6012c233d51dedb5bca3a55c93639b757d7328bb5cf8d388392ed14755d7b98fd38dc674b40bc78ad2a5d8d6ccea962e1b6cdef4263e30f9a9166861f260f25008ed66a7ea5d9e25606fa93175f6cfde7f777e7070f662cec891a41e6730677e74ef351ac0b6f9052ccd3a0ed7174ece19e51ce8d922dff4d963dad06d5ab07bce0282dd72673bea8352c338f18fa65d2aa4f903b20a5fd284bb4fc92d0385f56a2ba00120a20e4522f37827b396d9f79e345cc4c5838d840ac113d2261bca8c08a8e2dbf8cfc2f9ec52d2c1379da2350bcca1e2fe16db8f2f772737d9c321164f32cc0c4fdb90d6114fbe09f854eee776efdc26aa96d040ea8f385d4c489a69c379d7334e5351acdc51f3bc8f70f6a52e8c2ae3a33b866c2738d60e5cebe02dd31fcc6ac8591ba6c71e58e5d8c898efbcc66dc5b710e8931c856b6caae3da25a3f2a052d9991f04161309cfe2ad6bf82b90eb6beaa33c234e7e62762eea43aa3a1a66ad019515a3250491f90e3e8b15118beb2e06727f8c7e86ab0b336d2b99daf7e8172c0c2c4efe209b78994af0a010e33b29d4a9a9e174d04949d8ae9555bd5ccedbb61df874639e248b6bb368c37835e2dc1444d189e501fa7eaa353ced863947860dde1cbfe6dbec04b3354cb0146b49ac05b13aeec0452f1bd795f177132c3da68e5410368ff7a23adb004ec4d9fc70c5699d4164cd6eb945d9160a56fcd06f53d7173b3414881a5acc56882b448ce9219d38d6fcac730812e582a8f433a44f7d2f41aef4bd4ed02e9e48e9d97b255acbbd7226ef2f26366ba35228d7b94aa243c0fd2a1af2ad5a7c93b47d2544f7687af53bf5ff9e8fa3eb7c6ee8cc1aedd4c079d858f8c6f3caf5d9ca5fb11d62c5b395e52d4ed2065bf7d0b7ce5e92d8009f39ce0d5232576d77e5d99b46f6b9fc0e555cf5d55556829dd99bab098d778b257762df1a412e01bf40a88d04dd3bdd3fd218dcb11607bc9bbbd331ddb2bd50a3830d49fe571f00c185e90346d2931210a8ddc2e613c1bc495f73b10ab29738cc13319bce41937e209b7df32c2c1c3fefb0de26a4f1dfb0cf3e6105a8f079fd916767e2745845966cdcb31d988b499534e754ab35f5386a306686d280d43768e1f16032c34f7f443fb087c7b4c0e5874d840ac0ce6be486a9f1bf6f390c37319a974e58383edd202ec082399fb785614cdaa14e149a3b0a96b53e1e409f1c2aa6de46e8c241823c236c7314075835d1880c00448031acf227e1c9e832d0d9cd9e1cb18bf46d2afc34b069a77b2500adb7a0126119e79db4085bb00f3f39971cd5a764511be86f16754b4583c6aa78e375c8b3861d98b39430998442c72f33d8eed4e7cc01c5a800cada36e843699deb57260299c884f21a442eb182ee3ebaba3e2cc52cb106bf4a45944013c1fdfdb11d65cd13009e8add56df30d3a088eae7e5fda9429a33165b2c8297247deed35611d648f1c78652b440a209a093c1c2dfa302f4048211e13d1d75b346f6ec1de36e932c4ef3087e9b1bd5a20edad0fe9c0591943150b61e1f61ba408439257d0c9b37e8a325a6e8230944cad9366026e9386415d5629cb485d6fd3d6962dd884dc7dfb5438545499511a6056757aba7a300d9ab04f1cf01db8060cb9363582ba57b1033a0bb1a93969f86d94150c5c7446eb4da3d63c7321a57bcd8d54436921202119d53ef9b9c4a92e424119eb47f496d5e21ac5d0153b97dfaf9456029f4f77ed3f2369e08119fd17298958b2b6a3d15252354cc2fe269f02dc9f879983ab90f8b229a8217995d23d13f4991498923287034d7642ea03a2dff6c45a0ec662ac9feda6a68a1ffb216ffb474d72b3f86d92f204748e697144a39a5407336d3e37870c5ea2853ce3a9c8126be098e24da06a02efa908686af3689c8de2ae700de4cd3c839332076ed4dc2bff984b3231e64031a6d0b6b3d54ffcc62536480055bc09d0f4bdaaaf6e4fc6ddfbe3d9a466a3f2802788304898945a96dca284d22e5270b9a7970e655bbcd4fcff4afaa99b64cb9687bdf883ac25711c06908d637142f0002eed7aec1d8cf95db1974606148e048fa6fa571c7bfa716083b69d48607456d92a1de09f37b9b37e32c1649e78304305ff693c8f456504b1a13ca8bc921dd27864d4c69d3fac5b02d093210a5005063ec3e82e13e0e986964f5f40a2cfefbec06527017c2e0d3b2422364e4c544ffb1baec2000b2ba8c5de807de750696bcebb8f8dc3b00eb430bbc838f2de112004dad86e0d79e03ceeca4f8ac073f324fc3b33f992b63dd7e676d795705dee6dbf626527c498ba36fe4e72dd8580934f4bcf4e1e35e2f7df7096cf625375fa86ec4a1916dbbe8146abfa4c6aa4b8db50d6b76f571019f955ef7b8489b16d92886cb4cfb3f8ef5b7661dd3f92a1ca724fe255c9e12c7ab441721faf6d93fbf7f7834e5658b8c3498c60cff4df70cae2918a58c7fa4ff16e965bc7d5fd7018786d0f0729470efd583dc66db468441ff529337d10b01376f83dd299c7ad981d037d6b764fa047e743bb79e95713fd422b711fdc7cbca1f3bc0f2cc7b03ba63439a5d2d886353c3c130ebcd07a24d69dc3418f1e858e441a0943d24e3732348a22bcbd0407518cea501090d04262bb9e6e09d22e82f9e8a24b1e50e363642253a67b274ab176e495581ccdaad1e55bd2098e5b6508ef46c0b92a32459ce5917eee25414f43dc88a6279a7ac59e03cf91ac82924aec9e52be674a5917dbe44cf2584553c56077bf7a0c62f27c5d33fabf5260c4f04702bb66c437a160758ac4d3b1b2808825809501cab0079856f76de9b800c8780b000827130f695cb2ce83d76dd412b1e1f742e786c92d376a59d09e6be927b79e37ac69ba2c3ac6b7af11df83c1c0ba3a0934c09c6a59d92a54110a5ff37e9963c98d64733c192b819d1911d12f01c6d6d4d91dee2e6faf7d4e8307a98f7efdf667d574f6c78cee92dfc34ece06478e87c21e897f0df5738adfefc6a8f43522d8cdefcb96ab136164636d0ca475489616b10cc98cd2b5a042a407f243653c8c71b3f212a39441f0e11f31b02205aa092809fa71687e08b2c28436fbe9bce0d0dc078c965b575643fd90e1e0b2b05c6ab9fa1833fb5514a8a19c584016548086bef22dfc52f2d8ca12ce90e82d11c32a170c9a759dc286143efb0b5722fc82ce", 0x5a, "628ce13b47d7faa96d686fa44ae18ee6be896dbe0ab5c656865e27438b8208f2113c3c7544b1c11cc76227d89df66a972607e01c0a79585979842e6516899c6784e9010e8a0947bd500802e341d4f11b8cd7f1d30c0d0af167fc"}}, 0x1073}) openat(r3, &(0x7f0000000000)='./file0\x00', 0x400, 0x9) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1120.854019] loop5: detected capacity change from 0 to 41948160 [ 1120.870221] loop4: detected capacity change from 0 to 41948160 [ 1120.875655] FAULT_INJECTION: forcing a failure. [ 1120.875655] name failslab, interval 1, probability 0, space 0, times 0 [ 1120.878283] CPU: 0 PID: 8074 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 1120.879853] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1120.881779] Call Trace: [ 1120.882390] dump_stack+0x107/0x167 [ 1120.883232] should_fail.cold+0x5/0xa [ 1120.884110] ? create_object.isra.0+0x3a/0xa30 [ 1120.885164] should_failslab+0x5/0x20 [ 1120.886070] kmem_cache_alloc+0x5b/0x310 [ 1120.887004] ? mark_held_locks+0x9e/0xe0 [ 1120.887936] create_object.isra.0+0x3a/0xa30 [ 1120.888966] kmemleak_alloc_percpu+0xa0/0x100 [ 1120.890015] pcpu_alloc+0x4e2/0x1240 [ 1120.890889] __kmem_cache_create+0x35a/0x520 [ 1120.890909] loop1: detected capacity change from 0 to 41948160 [ 1120.891899] kmem_cache_create_usercopy+0x1db/0x2f0 [ 1120.891930] p9_client_create+0xc6a/0x1230 [ 1120.891964] ? p9_client_flush+0x430/0x430 [ 1120.896256] ? trace_hardirqs_on+0x5b/0x180 [ 1120.897255] ? lockdep_init_map_type+0x2c7/0x780 [ 1120.898360] ? __raw_spin_lock_init+0x36/0x110 [ 1120.899494] v9fs_session_init+0x1dd/0x1680 [ 1120.900493] ? lock_release+0x680/0x680 [ 1120.901418] ? kmem_cache_alloc_trace+0x151/0x320 [ 1120.902545] ? v9fs_show_options+0x690/0x690 [ 1120.903568] ? trace_hardirqs_on+0x5b/0x180 [ 1120.904564] ? kasan_unpoison_shadow+0x33/0x50 [ 1120.905613] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1120.906798] v9fs_mount+0x79/0x8f0 [ 1120.907619] ? v9fs_write_inode+0x60/0x60 [ 1120.908566] legacy_get_tree+0x105/0x220 [ 1120.909504] vfs_get_tree+0x8e/0x300 [ 1120.910370] path_mount+0x1490/0x21e0 [ 1120.911250] ? strncpy_from_user+0x9e/0x470 [ 1120.912249] ? finish_automount+0xa90/0xa90 [ 1120.913243] ? getname_flags.part.0+0x1dd/0x4f0 [ 1120.914327] ? _copy_from_user+0xfb/0x1b0 [ 1120.915298] __x64_sys_mount+0x282/0x300 [ 1120.916235] ? copy_mnt_ns+0xa00/0xa00 [ 1120.917129] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1120.918364] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1120.919555] do_syscall_64+0x33/0x40 [ 1120.920414] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1120.921597] RIP: 0033:0x7f42b2db2b19 [ 1120.922458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1120.926733] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1120.928495] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 1120.930161] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1120.931804] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 1120.933442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1120.935088] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 1120.963065] FAT-fs (loop5): Unrecognized mount option "ÿÿÿÿÿÿÿÿ" or missing value [ 1120.967313] loop3: detected capacity change from 0 to 41948160 [ 1120.979004] loop2: detected capacity change from 0 to 41948160 [ 1120.991571] FAT-fs (loop2): Unrecognized mount option "mnt/encrypted_dir/file0" or missing value [ 1121.020590] loop3: detected capacity change from 0 to 135266304 [ 1121.036609] FAT-fs (loop3): Unrecognized mount option "127.0.0.1" or missing value 01:13:28 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000480)=0xe8) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000200)='mnt/encrypted_dir\x00', 0x7, 0x3, &(0x7f0000000500)=[{&(0x7f0000000240)="8a86b32cea78cb33441548cddd77d97210ca01afcddbb41e670d9fff3d78eb9ecaca0a54ebcb22a678f2bf0c5a60fc82efca5ab85547e251fc32202b216a7f7599902107d6fdeb07c625dad1dc75091da78fb7c35dfbdcf4a1e64432b81b9008a5e72f14aa13bb80b32c4e3c58791f0343867907d4feef053b6dc6a4fad561dff510313be122ce4a66717c07890f12ed43db6c0734fb8f6bcdd6e30f3ec1d49ce30d05bfe912d9a6806169a76f6bdc8e2201ab089c0ff1043883bbc5bfd58889de13c4e53502b6b9a6dea1440e740aff427678b5a44b1cdc030ed4ad97ce5bf963a6227727d9cd", 0xe7, 0xfffffffffffffffc}, {&(0x7f0000000340)="a8ed162dcfc20955c9b53f47363747a877c580fdeac373261d4f4f25f03704779cb4acd6a9c7fc98236dda1267e0a75e167a3477ba02148944693a33d0ea0a236ab04af1b7a0780b2cf30f960c9bc33b8e926ac80e2742c894d1711be7200c", 0x5f, 0xd51}, {&(0x7f00000003c0)="01a4ef1efc3e5173eb0091c10f2154151859a1ede64aabbe2f846bc0d05584639b3b405bb047653325862b0b76ada88d99f59428bb38e8659a71cdc53f28f3e79bcd558724f22ffe3ab17846b98a62a429e9a08fa01b5b62943e55cf98b3c1db0b324f9c19674829fdd0c2abb31e838e631c4c7d7b38522d4f2fc14f4f6abbdb38c062481aa678055a1fcf5955f9", 0x8e, 0x40}], 0x80020, &(0x7f0000000680)={[{@fat=@tz_utc}, {@fat=@codepage={'codepage', 0x3d, '932'}}, {@nodots}, {@dots}, {@fat=@codepage={'codepage', 0x3d, '1255'}}, {@fat=@flush}], [{@euid_lt={'euid<', r0}}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$bind(&(0x7f0000000700)='mnt/encrypted_dir\x00', &(0x7f0000000740)='./file1\x00', &(0x7f0000000780), 0x100002, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1121.056997] loop2: detected capacity change from 0 to 135266304 [ 1121.061556] FAT-fs (loop2): Unrecognized mount option "mnt/encr" or missing value 01:13:28 executing program 7: perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext={0xdf0, 0x40000000000000}, 0x0, 0x4000, 0x2, 0x0, 0x0, 0xfffffffc, 0xdffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x3, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x10000000000002a6) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x44084) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r3, 0x40000006c, 0x38cb836d, 0x100000000000}) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000240), 0x8100, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r4, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)={0x90, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0xfffffc00}, {0x6, 0x16, 0x8}, {0x5, 0x12, 0x1}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x48}, {0x6, 0x16, 0x6}, {0x5, 0x12, 0x1}}]}, 0x90}, 0x1, 0x0, 0x0, 0x20004000}, 0x80) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x4, 0xffffffff, 0x1f, 0x4}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r2, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c006e005a230700000000000000e83580dc56d2db77258df21b8eb8a29560e8d946e31f", @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf25620000000600b400d00300000600b4000600b300020000000600b4000c0200"/54], 0x3c}}, 0x8000) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendfile(r1, 0xffffffffffffffff, 0x0, 0x40001) read(0xffffffffffffffff, &(0x7f0000000140)=""/123, 0x7b) 01:13:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000000)='./file0\x00', 0x100) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000200), 0x10000, 0x0) openat(r0, &(0x7f0000000240)='./mnt\x00', 0x14e000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1121.169652] loop6: detected capacity change from 0 to 41948160 01:13:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000200)='./mnt\x00', 0x5, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000240)="f642d8b15a82fe6c12464297b5e07e9350cda8260b2e52c15036fa41a6d4b8fb82b9396b72e1a2521c53e6a36e46e5bee8125bfb484548f552bb64b790aaf7287374b2da46559958bc1c67b4006a8ccedd9aa0306c4b72cd734a7834052704bbadc3647e67748ee8960b403818cfbf1bc3212bdef1c74877de8423d8dbcd33bf4bffc796f4cf3b526dcea7526e62233af111a18757e357057efa792c319dd76e6f25e7362363df2ca32b62f2f588bf238d086a151b1629d3ba3f2c01c7", 0xbd, 0x2}, {&(0x7f0000000300)="d863959409703762d6a90a6ceed002afff9c7183693b7fc28237cf6ad875ce33e93f20d483abfae96897e9b4ef8e5430c64b340c77ebf95678e6f9b0915adc87913aa52ac14a0d72eeecde9af159abf151e7846af28d7318a7257f1f5c74ca963cb3935b033b5f83dc719bf56a6552a777dc4315b7d2c7a933ca47991e31e84b563ba37ddf1e4fe17e7ee2182c6a46700c16e8bd407e17fed87a098cbec3045fecadcaf4f6e4ceffc98c980685063b8d5689f435b958a60ee5213a7a3f6947d2d36ac18f71757bd4c71c6f239c93556aa19677e0fd2f2c78aaeef20c45e1b3e0748607942a94962ff44de61457ea7ca9029e22c10a1801", 0xf7, 0x8}, {&(0x7f0000000400)="f173183513eb2423a9caceb41b6b909bd201a13457ee8a8ed94bf1e2fa5bc3c6f1abd0bb623aa4bd4a96d6f57139e2a59d0062d31896f7241a73b602a62af51e0cfffaf9a35613737ebf4f99c89bec16aacc491fd576363148aa4650494cc0bd3fb6540b9d16959ee9eb0642052dad72d441e9e71a3a64fb8f5bcd4c6107b03e5a01c7ab6f56ba493178eae784647d65a1e718ee93be478020", 0x99, 0xffffffff}, {&(0x7f0000000500)="f30b83fb048316cddf570e5a5a66ea108e3e6f1a2af12674d382871bc0bf71ae6ff9dc1088a0fc1455cae0228d9b6490181c60134bd52c0c7fbe45e2974f6d9cbf3bef34fc65e42ce336bdd0a7e611202be7547bdfa3c89c56f90994d8bc69e31e9086b8cc4a5119029165ef0fa078e23b60acf26f47fc85970174676b5831c7d0dc86c5bd32e047ad141cec6d644e498f27c1e1341ee97b34ad64e15ecadcc1", 0xa0, 0x5}], 0x0, &(0x7f0000000640)={[{'vfat\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x30}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@appraise_type}, {@smackfsfloor}, {@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@subj_user={'subj_user', 0x3d, 'vfat\x00'}}]}) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={0x101, 0x8}, 0x18) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x10, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r1, 0x0, &(0x7f0000000980)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x4004, @fd=r0, 0x200, &(0x7f0000000900)=""/115, 0x73, 0x11, 0x1}, 0x8) execveat(0xffffffffffffff9c, &(0x7f0000000700)='mnt/encrypted_dir\x00', &(0x7f00000007c0)=[&(0x7f0000000740)='{.\x04/\x00', &(0x7f0000000780)='\x00'], &(0x7f0000000840)=[&(0x7f0000000800)='/+#%/\x00'], 0x1000) 01:13:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x2, &(0x7f0000000500)='./file0\x00', r2, &(0x7f0000000540)="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") setresuid(0xffffffffffffffff, r2, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='./mnt\x00', &(0x7f0000000240), 0x1901002, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=unix,access=user,access=', @ANYRESDEC, @ANYBLOB="2c6c666c7475694b3d5f16f57c6488040c9f0447419a687f9a67b00eba3872f14828aa850e04e59504affae7d3198cf499f3a9fa02ecba41d86a2a25b1573715a74880df4c5335280272ba7be7c8b9e5623e0e4645544565b91e74bafbe61ef9abe88eb3b3e38808f3762781728100c29018f3cc072351", @ANYRESHEX=r0, @ANYBLOB="2c646566636f6e74657874e34e923cdcb2094d67aa4ee6f848443d757365725f752c7375626a5f726f6c653d76666174002c657569643cfddebd238b588db31fcd82636ca3d34b58236e7b31098d42e9db4785bffd4a0b05240a82c145f4d3f76c96fe113d162de7d4c9a66decd25ac2293006117c8cba2806a4f8ab7f11143c2597eff47ed0ae844eed24797486950aa9c647c9c8ac0001c840dd37d33f40d5cef88e7e509a4852908302d3f277cba6af6839970bf0cd90990e5353b4637452c945eafa8169741562e2254cbf11e36701b323b262a682fa87f4704ab52572f68ead5b626f3e6f", @ANYRESDEC=r2, @ANYBLOB=',obj_role=vfat\x00,cgntext=sysadm_u,smackfshat=,appraise_type=imasig,\x00']) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYRES32=0xee01, @ANYRES32=r6, @ANYBLOB="d46cfb78ef7d8a86"]) setxattr$system_posix_acl(&(0x7f0000001700)='mnt/encrypted_dir\x00', &(0x7f0000001740)='system.posix_acl_default\x00', &(0x7f0000001780)={{}, {0x1, 0x4}, [{0x2, 0x3, r4}, {0x2, 0x6, r2}, {0x2, 0x2, r2}], {0x4, 0xd}, [{0x8, 0x1, r1}, {0x8, 0x1, r6}, {0x8, 0x3, r3}, {0x8, 0x5, r3}], {0x10, 0x1}}, 0x5c, 0x3) r7 = syz_open_procfs(0x0, &(0x7f0000001540)='net/ip6_tables_matches\x00') execveat(r7, &(0x7f0000001580)='./mnt\x00', &(0x7f0000001640)=[&(0x7f00000015c0)='-}^\x00', &(0x7f0000001600)='9p\x00'], &(0x7f00000016c0)=[&(0x7f0000001680)='vfat\x00'], 0x0) creat(&(0x7f0000000280)='mnt/encrypted_dir\x00', 0x155) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:13:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = syz_io_uring_setup(0x1e16, &(0x7f0000000200)={0x0, 0x4339, 0x2, 0x0, 0x354}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000280)=0x0) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) r4 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2, 0x30, r0, 0x8000000) r9 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r9, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r9, 0x0) syz_io_uring_submit(r8, r6, &(0x7f0000000380)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x5, 0x0, r9, 0x0, 0x0, 0x0, 0x2, 0x1, {0x1}}, 0x7f) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000340)=@IORING_OP_LINK_TIMEOUT={0xf, 0x3, 0x0, 0x0, 0x0, &(0x7f0000000300)={r2, r3+60000000}, 0x1, 0x0, 0x1, {0x0, r7}}, 0xfffff000) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:13:28 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 57) [ 1121.266614] FAULT_INJECTION: forcing a failure. 01:13:28 executing program 2: mmap$IORING_OFF_CQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000000, 0x13, 0xffffffffffffffff, 0x8000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x2) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1121.266614] name failslab, interval 1, probability 0, space 0, times 0 [ 1121.269297] CPU: 1 PID: 8113 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 1121.270810] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1121.272605] Call Trace: [ 1121.273187] dump_stack+0x107/0x167 [ 1121.273989] should_fail.cold+0x5/0xa [ 1121.274818] ? create_object.isra.0+0x3a/0xa30 [ 1121.275815] should_failslab+0x5/0x20 [ 1121.276642] kmem_cache_alloc+0x5b/0x310 [ 1121.277533] ? mark_held_locks+0x9e/0xe0 [ 1121.278432] create_object.isra.0+0x3a/0xa30 [ 1121.279400] kmemleak_alloc_percpu+0xa0/0x100 [ 1121.280397] pcpu_alloc+0x4e2/0x1240 [ 1121.281218] __kmem_cache_create+0x35a/0x520 [ 1121.282181] kmem_cache_create_usercopy+0x1db/0x2f0 [ 1121.283286] p9_client_create+0xc6a/0x1230 [ 1121.284225] ? p9_client_flush+0x430/0x430 [ 1121.285141] ? trace_hardirqs_on+0x5b/0x180 [ 1121.286084] ? lockdep_init_map_type+0x2c7/0x780 [ 1121.287111] ? __raw_spin_lock_init+0x36/0x110 [ 1121.288112] v9fs_session_init+0x1dd/0x1680 [ 1121.289059] ? lock_release+0x680/0x680 [ 1121.289940] ? kmem_cache_alloc_trace+0x151/0x320 [ 1121.290982] ? v9fs_show_options+0x690/0x690 [ 1121.291954] ? trace_hardirqs_on+0x5b/0x180 [ 1121.292887] ? kasan_unpoison_shadow+0x33/0x50 [ 1121.293882] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1121.294981] v9fs_mount+0x79/0x8f0 [ 1121.295759] ? v9fs_write_inode+0x60/0x60 [ 1121.296652] legacy_get_tree+0x105/0x220 [ 1121.297545] vfs_get_tree+0x8e/0x300 [ 1121.298364] path_mount+0x1490/0x21e0 [ 1121.299194] ? strncpy_from_user+0x9e/0x470 [ 1121.300134] ? finish_automount+0xa90/0xa90 [ 1121.301070] ? getname_flags.part.0+0x1dd/0x4f0 [ 1121.302093] ? _copy_from_user+0xfb/0x1b0 [ 1121.303010] __x64_sys_mount+0x282/0x300 [ 1121.303889] ? copy_mnt_ns+0xa00/0xa00 [ 1121.304733] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1121.305874] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1121.306985] do_syscall_64+0x33/0x40 [ 1121.307792] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1121.308895] RIP: 0033:0x7f42b2db2b19 [ 1121.309713] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1121.313713] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1121.315363] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 1121.316907] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1121.318465] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 1121.320008] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1121.321553] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 1121.323578] loop3: detected capacity change from 0 to 41948160 [ 1121.329249] loop5: detected capacity change from 0 to 41948160 01:13:28 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='mnt/encrypted_dir\x00', 0x0, 0x0, &(0x7f0000000000), 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(r0, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x40600, 0x20) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1121.332484] loop1: detected capacity change from 0 to 41948160 [ 1121.356568] loop4: detected capacity change from 0 to 41948160 [ 1121.371046] loop2: detected capacity change from 0 to 41948160 01:13:28 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000280), &(0x7f00000002c0), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)={0x168, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3f}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xfffffe01}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x94f}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x81}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x9e}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1f}}]}, 0x168}, 0x1, 0x0, 0x0, 0x8080}, 0x44005) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x18, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x4, 0xd}]}, 0x18}}, 0x0) [ 1121.629477] FAT-fs (loop6): bogus number of reserved sectors [ 1121.631000] FAT-fs (loop6): Can't find a valid FAT filesystem 01:13:42 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 58) 01:13:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x10010009fd}, {&(0x7f0000000200)="6704f261e6cc21bd79251d4167c754fe67d84c43bf1a91a52f50630311f59caaad7ee4f731a4652f54b65f332a3ec76a2828027cfa5e04a30acd3ec51ca2acc4bd475bb9c021907d7e8f6ddfd4798ead4f4aaee161ef19f1", 0x58, 0xe56}], 0x3820008, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:13:42 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x60040}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@ipv4={""/10, ""/2, @dev}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {r3, r4}}, './file0\x00'}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x2, 0x8, 0x800}]}) write$binfmt_elf64(r5, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x7, 0x1, 0x4, 0x20, 0x3, 0x3e, 0x8000, 0x377, 0x40, 0x60, 0x73d8, 0x2, 0x38, 0x1, 0x400, 0x4, 0x3ff}, [{0x7, 0x4, 0xffffffffc36dcca9, 0x10001, 0x9, 0x6, 0x4, 0x7}, {0x3, 0x1000, 0x9, 0x20, 0x9, 0x8, 0x0, 0x46ef}], "97a3dd22e5ee7f6a5ff669df6d1439f11a78768d91f77db96d27eea0ed4c3c525f1e4e2dce4d044571b4feab7a05b8ca3a96a857b899cb4a2d8bf65100a14ac1b7ac51ff44c240030a08bf0e238926d5e7f1c172d61757b4266185c96111746cc1e9415ea2b1e6d1375024050d404d5cc6ec493b873f3d2ddbf576ebcf6a0190529b6fda727583d28ff99595142d42bcac9d31257480c42dfedede26e7e48e182c42f48e73bae2d68b6e491034956cb3336e5b12b44f77861e9e77eebd5e3c1b947709d77f35f73e8b3c9f96b074c710ee9c99f8ec6fd4682c114533683b62c36a2e6c5023e686dd7f8e807f1d39e909d4e082b475", ['\x00', '\x00', '\x00', '\x00']}, 0x5a5) 01:13:42 executing program 6: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000340)=ANY=[@ANYBLOB="3fee00b802324e2b9329", @ANYRESDEC=r0, @ANYRES16, @ANYBLOB="e4c3d66251c9674125f2fb1e5c1dba652eb62ee4b40d0314639f90ef143293016ec964578e806e74e620b3dd5f2f77e1fe5490d29f4ca0324e53c8f8dd4827b4069136adf526841b025ac9a5091c7692f7ae5bd39a9592d86ebb9ebe40e59aecde215582f9d4d38e790556c5e44f09ab45d030", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r0]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r3, 0x0) r4 = openat(r3, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x1) write$binfmt_script(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) openat(r3, &(0x7f0000000200)='mnt/encrypted_dir\x00', 0x400200, 0x20) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r4, 0x0) openat(r4, &(0x7f0000000000)='./file0\x00', 0x491f3e5528ff9f06, 0x100) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:13:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:13:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$incfs_metadata(&(0x7f0000000000)='mnt/encrypted_dir\x00', &(0x7f0000000200), &(0x7f0000000240)="de6086030ad4c38ce95a27649bcd24d44b5d290ff1813f0a44fac099372a126cafb786cd3d6dc0b885014eac80fe0e6e3dfab50034c49baa376294109083417c089199a0b2c200d29bfb98e2f66fa104691af052cb5ac073ee44277f832c69253652f7344e865200395f9d258beb72bd4a78268e", 0x74, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:13:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) unlinkat(r0, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x200) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0xfb, 0x65, 0x0, 0x80, "a9f386abad983508d1135db355cc2f4a", "4ef1e98557c0f5b2b45acb1ae5414110f53799787b759e6c974e4ee352a07c2585f157a3cbae2fbbe1fce1b440b269ef64f5daaaac1a23d00e9afb8167b0606cc948cfebafbf9270043489a398268f3f"}, 0x65, 0x0) 01:13:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x4000) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1135.659444] loop2: detected capacity change from 0 to 41948160 [ 1135.674989] loop4: detected capacity change from 0 to 41948160 [ 1135.677452] loop1: detected capacity change from 0 to 41948160 [ 1135.686367] FAULT_INJECTION: forcing a failure. [ 1135.686367] name failslab, interval 1, probability 0, space 0, times 0 [ 1135.689294] CPU: 0 PID: 8165 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 1135.691008] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1135.693072] Call Trace: [ 1135.693735] dump_stack+0x107/0x167 [ 1135.694652] should_fail.cold+0x5/0xa [ 1135.695592] ? create_object.isra.0+0x3a/0xa30 [ 1135.696693] should_failslab+0x5/0x20 [ 1135.697586] kmem_cache_alloc+0x5b/0x310 [ 1135.698629] ? lock_release+0x680/0x680 [ 1135.699637] create_object.isra.0+0x3a/0xa30 [ 1135.700728] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1135.702028] __kmalloc_track_caller+0x177/0x370 [ 1135.703194] ? kstrdup_const+0x53/0x80 [ 1135.704098] kstrdup+0x36/0x70 [ 1135.704900] kstrdup_const+0x53/0x80 [ 1135.705859] kvasprintf_const+0x10c/0x1a0 [ 1135.706916] kobject_set_name_vargs+0x56/0x150 [ 1135.708078] kobject_init_and_add+0xc9/0x160 [ 1135.709201] ? kobject_create_and_add+0xb0/0xb0 [ 1135.710427] ? wait_for_completion_io+0x270/0x270 [ 1135.711617] ? kernfs_name_hash+0xe7/0x110 [ 1135.712609] ? kernfs_find_ns+0x256/0x380 [ 1135.713682] sysfs_slab_add+0x172/0x200 [ 1135.714720] __kmem_cache_create+0x3db/0x520 [ 1135.715849] kmem_cache_create_usercopy+0x1db/0x2f0 [ 1135.717158] p9_client_create+0xc6a/0x1230 [ 1135.718290] ? p9_client_flush+0x430/0x430 [ 1135.719396] ? trace_hardirqs_on+0x5b/0x180 [ 1135.720401] ? lockdep_init_map_type+0x2c7/0x780 [ 1135.721636] ? __raw_spin_lock_init+0x36/0x110 [ 1135.722935] v9fs_session_init+0x1dd/0x1680 [ 1135.724383] ? lock_release+0x680/0x680 [ 1135.725643] ? kmem_cache_alloc_trace+0x151/0x320 [ 1135.726780] ? v9fs_show_options+0x690/0x690 [ 1135.727803] ? trace_hardirqs_on+0x5b/0x180 [ 1135.728802] ? kasan_unpoison_shadow+0x33/0x50 [ 1135.729879] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1135.731065] v9fs_mount+0x79/0x8f0 [ 1135.731872] ? v9fs_write_inode+0x60/0x60 [ 1135.732829] legacy_get_tree+0x105/0x220 [ 1135.733777] vfs_get_tree+0x8e/0x300 [ 1135.734709] path_mount+0x1490/0x21e0 [ 1135.735591] ? strncpy_from_user+0x9e/0x470 [ 1135.736585] ? finish_automount+0xa90/0xa90 [ 1135.737593] ? getname_flags.part.0+0x1dd/0x4f0 [ 1135.738673] ? _copy_from_user+0xfb/0x1b0 [ 1135.739637] __x64_sys_mount+0x282/0x300 [ 1135.740567] ? copy_mnt_ns+0xa00/0xa00 [ 1135.741483] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1135.742756] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1135.743958] do_syscall_64+0x33/0x40 [ 1135.744835] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1135.746048] RIP: 0033:0x7f42b2db2b19 [ 1135.746908] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1135.751189] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1135.752946] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 1135.754600] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1135.756251] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 1135.757907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1135.759555] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 1135.761947] loop3: detected capacity change from 0 to 41947648 [ 1135.787899] loop5: detected capacity change from 0 to 41948160 01:13:42 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f00000000c0)=@dstopts={0xff, 0xd, '\x00', [@pad1, @pad1, @ra={0x5, 0x2, 0x401}, @jumbo={0xc2, 0x4, 0x5}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x8, 0x15, "ac000471c7f1bfcb031ff24a4a7d28e0f5b85d50db"}, @calipso={0x7, 0x10, {0x2, 0x2, 0x3, 0x8, [0x800]}}, @hao={0xc9, 0x10, @private1}, @padn={0x1, 0x1, [0x0]}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x43}}]}, 0x78) [ 1135.808000] loop6: detected capacity change from 0 to 41948160 01:13:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0}, 'mnt/encrypted_dir\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) socketpair(0x22, 0x6, 0x6, &(0x7f0000000000)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x8, 0x3) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:13:42 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='mnt/encrypted_dir\x00', 0x81, 0x0, 0x0, 0x90008, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:13:42 executing program 0: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@afid}]}}) (fail_nth: 59) [ 1135.905324] loop3: detected capacity change from 0 to 41947648 [ 1135.944163] FAULT_INJECTION: forcing a failure. [ 1135.944163] name failslab, interval 1, probability 0, space 0, times 0 [ 1135.945544] CPU: 1 PID: 8202 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 1135.946342] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1135.947296] Call Trace: [ 1135.947608] dump_stack+0x107/0x167 [ 1135.948033] should_fail.cold+0x5/0xa [ 1135.948476] should_failslab+0x5/0x20 [ 1135.948912] __kmalloc_track_caller+0x79/0x370 [ 1135.949433] ? kstrdup_const+0x53/0x80 [ 1135.949898] kstrdup+0x36/0x70 [ 1135.950268] kstrdup_const+0x53/0x80 [ 1135.950697] __kernfs_new_node+0x9d/0x860 [ 1135.951183] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1135.951736] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1135.952336] ? SOFTIRQ_verbose+0x10/0x10 [ 1135.952810] ? lock_release+0x680/0x680 [ 1135.953264] ? find_held_lock+0x2c/0x110 [ 1135.953735] kernfs_new_node+0x18d/0x250 [ 1135.954213] kernfs_create_dir_ns+0x49/0x160 [ 1135.954716] sysfs_create_dir_ns+0x127/0x290 [ 1135.955225] ? sysfs_create_mount_point+0xb0/0xb0 [ 1135.955780] ? rwlock_bug.part.0+0x90/0x90 [ 1135.956267] ? do_raw_spin_unlock+0x4f/0x220 [ 1135.956777] kobject_add_internal+0x25e/0xa30 [ 1135.957299] kobject_init_and_add+0x101/0x160 [ 1135.957816] ? kobject_create_and_add+0xb0/0xb0 [ 1135.958365] ? wait_for_completion_io+0x270/0x270 [ 1135.958917] ? kernfs_name_hash+0xe7/0x110 [ 1135.959399] ? kernfs_find_ns+0x256/0x380 [ 1135.959887] sysfs_slab_add+0x172/0x200 [ 1135.960342] __kmem_cache_create+0x3db/0x520 [ 1135.960849] kmem_cache_create_usercopy+0x1db/0x2f0 [ 1135.961424] p9_client_create+0xc6a/0x1230 [ 1135.961940] ? p9_client_flush+0x430/0x430 [ 1135.962431] ? trace_hardirqs_on+0x5b/0x180 [ 1135.962930] ? lockdep_init_map_type+0x2c7/0x780 [ 1135.963474] ? __raw_spin_lock_init+0x36/0x110 [ 1135.964012] v9fs_session_init+0x1dd/0x1680 [ 1135.964511] ? lock_release+0x680/0x680 [ 1135.964972] ? kmem_cache_alloc_trace+0x151/0x320 [ 1135.965527] ? v9fs_show_options+0x690/0x690 [ 1135.966053] ? trace_hardirqs_on+0x5b/0x180 [ 1135.966552] ? kasan_unpoison_shadow+0x33/0x50 [ 1135.967082] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1135.967680] v9fs_mount+0x79/0x8f0 [ 1135.968100] ? v9fs_write_inode+0x60/0x60 [ 1135.968575] legacy_get_tree+0x105/0x220 [ 1135.969053] vfs_get_tree+0x8e/0x300 [ 1135.969478] path_mount+0x1490/0x21e0 [ 1135.969944] ? strncpy_from_user+0x9e/0x470 [ 1135.970438] ? finish_automount+0xa90/0xa90 [ 1135.970937] ? getname_flags.part.0+0x1dd/0x4f0 [ 1135.971469] ? _copy_from_user+0xfb/0x1b0 [ 1135.971958] __x64_sys_mount+0x282/0x300 [ 1135.972421] ? copy_mnt_ns+0xa00/0xa00 [ 1135.972877] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1135.973476] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1135.974092] do_syscall_64+0x33/0x40 [ 1135.974520] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1135.975119] RIP: 0033:0x7f42b2db2b19 [ 1135.975545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1135.977667] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1135.978567] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 1135.979389] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1135.980209] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 1135.981036] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1135.981868] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 [ 1135.982771] kobject_add_internal failed for 9p-fcall-cache-101 (error: -12 parent: slab) [ 1135.983775] kmem_cache_create(9p-fcall-cache-101) failed with error -12 [ 1135.984543] CPU: 1 PID: 8202 Comm: syz-executor.0 Not tainted 5.10.242 #1 [ 1135.985285] loop6: detected capacity change from 0 to 41948160 [ 1135.985329] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1135.985341] Call Trace: [ 1135.987993] dump_stack+0x107/0x167 [ 1135.988420] kmem_cache_create_usercopy.cold+0x17/0x65 [ 1135.989025] p9_client_create+0xc6a/0x1230 [ 1135.989527] ? p9_client_flush+0x430/0x430 [ 1135.990032] ? trace_hardirqs_on+0x5b/0x180 [ 1135.990542] ? lockdep_init_map_type+0x2c7/0x780 [ 1135.991108] ? __raw_spin_lock_init+0x36/0x110 [ 1135.991649] v9fs_session_init+0x1dd/0x1680 [ 1135.992157] ? lock_release+0x680/0x680 [ 1135.992641] ? kmem_cache_alloc_trace+0x151/0x320 [ 1135.993208] ? v9fs_show_options+0x690/0x690 [ 1135.993738] ? trace_hardirqs_on+0x5b/0x180 [ 1135.994263] ? kasan_unpoison_shadow+0x33/0x50 [ 1135.994803] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1135.995383] v9fs_mount+0x79/0x8f0 [ 1135.995797] ? v9fs_write_inode+0x60/0x60 [ 1135.996271] legacy_get_tree+0x105/0x220 [ 1135.996737] vfs_get_tree+0x8e/0x300 [ 1135.997167] path_mount+0x1490/0x21e0 [ 1135.997617] ? strncpy_from_user+0x9e/0x470 [ 1135.998140] ? finish_automount+0xa90/0xa90 [ 1135.998634] ? getname_flags.part.0+0x1dd/0x4f0 [ 1135.999165] ? _copy_from_user+0xfb/0x1b0 [ 1135.999645] __x64_sys_mount+0x282/0x300 [ 1136.000117] ? copy_mnt_ns+0xa00/0xa00 [ 1136.000568] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1136.001169] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1136.001768] do_syscall_64+0x33/0x40 [ 1136.002203] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1136.002796] RIP: 0033:0x7f42b2db2b19 [ 1136.003221] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1136.005335] RSP: 002b:00007f42b0328188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1136.006213] RAX: ffffffffffffffda RBX: 00007f42b2ec5f60 RCX: 00007f42b2db2b19 [ 1136.007026] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1136.007848] RBP: 00007f42b03281d0 R08: 0000000020000400 R09: 0000000000000000 [ 1136.008660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1136.009475] R13: 00007ffefa2f3b3f R14: 00007f42b0328300 R15: 0000000000022000 01:13:42 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x80, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0xffffffffffffff9d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x2502, 0x0) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000000020000000000000000000000400000000000000033000000000000000700000001003800000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000232fb6560197b1fa9d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e5ffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/719], 0x478) mmap$IORING_OFF_CQ_RING(&(0x7f0000aa7000/0x3000)=nil, 0x3000, 0x1000004, 0x13, r0, 0x8000000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x8) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30}, &(0x7f0000000300)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x6f, 0x7f, 0x8, 0x40, 0x0, 0x7f, 0x1680, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2}, 0x2428, 0xffff, 0x9, 0x6, 0xa3b, 0xff, 0xfffc, 0x0, 0x3, 0x0, 0x5}, 0x0, 0x4, r2, 0x3) creat(&(0x7f0000000180)='./file1\x00', 0x4) socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="200000002c00010000000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="04000088"], 0x20}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) 01:13:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) lchown(&(0x7f0000002d00)='./file0\x00', r0, 0xee01) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') recvmsg$unix(0xffffffffffffffff, &(0x7f0000002cc0)={&(0x7f0000001600)=@abs, 0x6e, &(0x7f0000002b80)=[{&(0x7f0000000480)}, {&(0x7f0000001680)=""/182, 0xb6}, {&(0x7f0000001740)=""/52, 0x34}, {&(0x7f0000001780)=""/197, 0xc5}, {&(0x7f0000001880)=""/208, 0xd0}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/246, 0xf6}, {&(0x7f0000002a80)=""/176, 0xb0}, {&(0x7f0000002b40)=""/1, 0x1}], 0x9, &(0x7f0000002c40)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0x48}, 0x40000000) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000200)='mnt/encrypted_dir\x00', 0x88, 0x5, &(0x7f0000001580)=[{&(0x7f0000000500)="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", 0x1000, 0x8}, {&(0x7f0000000240)="bdce6527282c952ba71f00ce904d2056cf4c6c26dc02b3850457d0a1a6b1c3177fc9269e50eb0f553b44ba533792e16e9bf0c700c9499a6da3f79ebfca227e15e8f34c9779287bcf002efb7ad01c1d5654597791e4f47f67c922d4e151b99f684cff6f8811b105f738c6976237f8829f1700b8c79d1ac8b980d071aefb8676037f0fa2226892fb6629315b7c6849322a74d15e7828c99381db6434325467e6b90c8c808f86173ebb390635e5d5f59647e4da1ec6211dcd4cd8fa0b20487e1c5a", 0xc0, 0x5}, {&(0x7f0000000300)="70413758c85ee4fc0281cb3453ac9e645f3a70329e3cd8032f8b0dbb76d8e0a47444d5504cf08d29eb10e6b0b30f98fa98e636efc94d7c3cc3382fe65c92b1a4ab1c61116d83c5a61f94eb9423764e5985223dd6c8c5cd7b73c3d5432dec4823eb4e9a836f4f511727ebc1f794fe35b2e5ca2d339d202fdfc8b43e6fbb03c7dc2d93e7555f6ecf56aed4c0dfddbef6cb668bed3beb45d208a79481ade39f688329bb562f39c95c70b5494135a2d9c34b28993a98", 0xb4, 0x1}, {&(0x7f00000003c0)="171f46b317615207945756770a74af4c8437c74c138e92c7a30f41e06536f18a0cdeb8cb4eead86ba34dcc6ec4fc6514ff4397629b4f88bf7485b0af008a63e31791b2bb01a4f57a799051ca9d89d6c9fa2066036aac1b8fa5933d00b261d59b5748f164f8529f657fe0b053d169e7765d0a2dfc66324fe5e37b62a10a41ae4aade93b1d51b72626e803ed9e3065b899bdce54a00c4cea8e", 0x98, 0x40}, {&(0x7f0000001500)="3dde2d5685865dbe5123e0edf6312cc6407c1a8ace47813758faa2a64fc3db8a3f2883e8daf715f1f1af6625cd082dcb342de37bd139bc1f398f137c39e7070a542272858bbbcc386629d7f301a78ae652ed88808bf7d6eb8c73ef7e6fdf868de819866d538dd03967", 0x69, 0x3}], 0x8402, &(0x7f0000002ec0)={[{@fat=@nfs}, {@fat=@nocase}], [{@context={'context', 0x3d, 'system_u'}}, {@euid_gt={'euid>', r3}}, {@dont_hash}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@smackfshat={'smackfshat', 0x3d, 'msdos\x00'}}, {@obj_user={'obj_user', 0x3d, '\\+(!\xe0\'\'%'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) openat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x200, 0x1) r4 = dup2(r2, r1) bind(r4, &(0x7f0000002e40)=@un=@abs={0x1, 0x0, 0x4e22}, 0x80) 01:13:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000000)=@sr0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000240)='tmpfs\x00', 0x2044, &(0x7f0000000280)='-!/$\x00') 01:13:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2802018, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYBLOB="aa08733512e152c6ae2c1b469933a291d110595dae73cbac867e3e784d8be555b59215ed549c3975e3563770d347b04c79ebf0242574d44a4654b0098fddc3119b282a5229a6ab41705b4e050467a7f6bec2960cf023eb58fe04657f0c6fb29119406960eeebcf5b27db21fd05015b1c47a01d20e198d8bb561219df123a5fea443f135849470bf4d725c81e0a1765cca0ab26e590be03a36c72d806514720ef9b8e8f85e86054248d335778c79f5739ba2677a337e78008fcbed9573a85f521366acf507967c8af39afda576f22aeed2acbed4895fc7bd4c6d1829f99ce46ac9c0ecf6dd94f15da7783ec1187b97952adabb06c29", @ANYRES32]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 01:13:43 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) fchmodat(r0, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x10) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1136.137774] loop3: detected capacity change from 0 to 41948160 01:13:43 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') setxattr$trusted_overlay_origin(&(0x7f0000000340)='./mnt\x00', &(0x7f0000000380), &(0x7f00000003c0), 0x2, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = syz_io_uring_setup(0x6c78, &(0x7f0000000200)={0x0, 0xcfef, 0x4, 0x2, 0x134}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000280)) r3 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)=0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) r7 = signalfd4(r3, &(0x7f0000000400)={[0xff]}, 0x8, 0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000480)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x2, &(0x7f0000000440)=[r1, r7, r0], 0x3, 0x0, 0x0, {0x0, r8}}, 0xbec) io_uring_enter(r3, 0x58ab, 0x0, 0x0, 0x0, 0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f00000002c0)=@IORING_OP_SPLICE={0x1e, 0x3, 0x0, @fd_index=0x1, 0x72, {0x0, r3}, 0x7fffffff, 0x5, 0x1, {0x0, r9, r0}}, 0x1000) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1136.158439] loop6: detected capacity change from 0 to 41948160 [ 1136.170890] loop3: detected capacity change from 0 to 41948160 01:13:43 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') close(r0) syz_mount_image$ext4(0x0, &(0x7f0000000480)='mnt/encrypted_dir\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200), &(0x7f0000000240), 0x2, 0x5) r1 = signalfd(r0, &(0x7f00000002c0)={[0x80000000]}, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b7e40cfbf"], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r2, 0x0) openat(r2, &(0x7f0000000340)='mnt/encrypted_dir\x00', 0x181702, 0x128) mkdirat(r1, &(0x7f0000000300)='mnt/encrypted_dir\x00', 0x4) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x6, 0x110, 0xffffffffffffffff, 0x10000000) r4 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r4, 0x0) io_uring_enter(r4, 0x58ab, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x74a7, &(0x7f0000000380)={0x0, 0x1bed, 0x1, 0x0, 0x2fd, 0x0, r1}, &(0x7f0000547000/0x4000)=nil, &(0x7f0000886000/0x4000)=nil, &(0x7f0000000400)=0x0, &(0x7f0000000440)) syz_io_uring_submit(r5, r3, &(0x7f0000000280)=@IORING_OP_STATX={0x15, 0x5, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc, &(0x7f0000000500)='./file0\x00', 0x20}, 0xc9e) 01:13:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x0) chdir(0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1136.279189] loop4: detected capacity change from 0 to 41948160 [ 1136.341958] loop5: detected capacity change from 0 to 135266304 [ 1151.843554] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888017787200 (size 32): comm "syz-executor.0", pid 8202, jiffies 4295802987 (age 24.482s) hex dump (first 32 bytes): 39 70 2d 66 63 61 6c 6c 2d 63 61 63 68 65 2d 31 9p-fcall-cache-1 30 31 00 17 80 88 ff ff 5f 74 3a 73 30 00 00 00 01......_t:s0... backtrace: [<0000000092788ec4>] kstrdup+0x36/0x70 [<000000005fdd98d5>] kstrdup_const+0x53/0x80 [<000000009d656cea>] kvasprintf_const+0x10c/0x1a0 [<00000000a722548d>] kobject_set_name_vargs+0x56/0x150 [<000000003d4eacf4>] kobject_init_and_add+0xc9/0x160 [<0000000031569ec8>] sysfs_slab_add+0x172/0x200 [<00000000aa81efa3>] __kmem_cache_create+0x3db/0x520 [<0000000025ef9372>] kmem_cache_create_usercopy+0x1db/0x2f0 [<00000000bd8fbe34>] p9_client_create+0xc6a/0x1230 [<00000000e726739d>] v9fs_session_init+0x1dd/0x1680 [<000000004fb959b1>] v9fs_mount+0x79/0x8f0 [<0000000060dcabbf>] legacy_get_tree+0x105/0x220 [<000000008d12291c>] vfs_get_tree+0x8e/0x300 [<00000000e920a623>] path_mount+0x1490/0x21e0 [<00000000eedd0f56>] __x64_sys_mount+0x282/0x300 [<0000000036661bdd>] do_syscall_64+0x33/0x40 BUG: leak checking failed VM DIAGNOSIS: 01:14:07 Registers: info registers vcpu 0 RAX=ffffffff83e97d20 RBX=0000000000000000 RCX=ffffffff83e7f98c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e984e8 RBP=0000000000000000 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85679ac8 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e97d2e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffe2cc37ff8 CR3=000000001ccbe000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=00000000dddd06aa EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=656a626f206465636e6572656665726e XMM02=3a29323320657a697328203030323738 XMM03=323820646970202c22302e726f747563 XMM04=2d6c6c6163662d703920203133206432 XMM05=64322063362063362031362033362036 XMM06=29736574796220323320747372696628 XMM07=342e3432206567612820373839323038 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e97d20 RBX=0000000000000001 RCX=ffffffff83e7f98c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e984e8 RBP=0000000000000001 RSP=ffff888008987e70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85679ac8 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e97d2e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f6afc7034d0 CR3=000000001ccbe000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=656a626f206465636e6572656665726e XMM02=3a29323320657a697328203030323738 XMM03=323820646970202c22302e726f747563 XMM04=2d6c6c6163662d703920203133206432 XMM05=64322063362063362031362033362036 XMM06=29736574796220323320747372696628 XMM07=342e3432206567612820373839323038 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000