96] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1599.839041] do_syscall_64+0x33/0x40 [ 1599.839359] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1599.839792] RIP: 0033:0x7f5315b2fb19 [ 1599.840120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1599.841659] RSP: 002b:00007f53130a5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1599.842316] RAX: ffffffffffffffda RBX: 00007f5315c42f60 RCX: 00007f5315b2fb19 [ 1599.842917] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000004 [ 1599.843521] RBP: 00007f53130a51d0 R08: 0000000000000000 R09: 0000000000000000 [ 1599.844120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1599.844723] R13: 00007ffe8ef08fcf R14: 00007f53130a5300 R15: 0000000000022000 [ 1599.849981] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 1599.867715] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:45:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x200006a7}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 1599.885278] FAULT_INJECTION: forcing a failure. [ 1599.885278] name failslab, interval 1, probability 0, space 0, times 0 [ 1599.887529] CPU: 0 PID: 31388 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1599.888148] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1599.888876] Call Trace: [ 1599.889126] dump_stack+0x107/0x167 [ 1599.889459] should_fail.cold+0x5/0xa [ 1599.889947] ? create_object.isra.0+0x3a/0xa20 [ 1599.890373] should_failslab+0x5/0x20 [ 1599.890725] kmem_cache_alloc+0x5b/0x310 [ 1599.891105] create_object.isra.0+0x3a/0xa20 [ 1599.891506] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1599.891970] __kmalloc_node+0x1ae/0x420 [ 1599.892346] kvmalloc_node+0x119/0x170 [ 1599.892704] seq_read_iter+0x81c/0x12b0 [ 1599.893080] ? find_held_lock+0x2c/0x110 [ 1599.893456] seq_read+0x3dd/0x5b0 [ 1599.893781] ? seq_read_iter+0x12b0/0x12b0 [ 1599.894247] ? _cond_resched+0x12/0x80 [ 1599.894613] ? fsnotify_perm.part.0+0x22d/0x620 [ 1599.895042] ? seq_read_iter+0x12b0/0x12b0 [ 1599.895430] proc_reg_read+0x22a/0x300 [ 1599.895792] do_iter_read+0x4fa/0x760 [ 1599.896150] ? import_iovec+0x83/0xb0 [ 1599.896504] vfs_readv+0xe5/0x160 [ 1599.896821] ? vfs_iter_read+0xa0/0xa0 [ 1599.897178] ? __fdget_pos+0xf1/0x190 13:45:55 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), 0x0) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) [ 1599.897525] ? lock_downgrade+0x6d0/0x6d0 [ 1599.897930] ? ksys_write+0x12d/0x260 [ 1599.898489] ? __fget_files+0x2f8/0x520 [ 1599.898878] do_readv+0x139/0x300 [ 1599.899198] ? vfs_readv+0x160/0x160 [ 1599.899544] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1599.900022] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1599.900496] do_syscall_64+0x33/0x40 [ 1599.900843] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1599.901313] RIP: 0033:0x7f4158a73b19 [ 1599.901654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1599.903404] RSP: 002b:00007f4155fe9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1599.904102] RAX: ffffffffffffffda RBX: 00007f4158b86f60 RCX: 00007f4158a73b19 [ 1599.904736] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000004 [ 1599.905373] RBP: 00007f4155fe91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1599.906030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1599.906679] R13: 00007fff8641640f R14: 00007f4155fe9300 R15: 0000000000022000 13:45:55 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 4) [ 1599.956491] FAULT_INJECTION: forcing a failure. [ 1599.956491] name failslab, interval 1, probability 0, space 0, times 0 [ 1599.958015] CPU: 0 PID: 31385 Comm: syz-executor.2 Not tainted 5.10.225 #1 [ 1599.958626] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1599.959189] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' [ 1599.959313] Call Trace: [ 1599.959333] dump_stack+0x107/0x167 [ 1599.959350] should_fail.cold+0x5/0xa [ 1599.960734] ? getname_flags.part.0+0x50/0x4f0 [ 1599.961122] should_failslab+0x5/0x20 [ 1599.961445] kmem_cache_alloc+0x5b/0x310 [ 1599.961794] ? strncpy_from_user+0x9e/0x470 [ 1599.962231] getname_flags.part.0+0x50/0x4f0 [ 1599.962604] getname_flags+0x9a/0xe0 [ 1599.962918] __x64_sys_rename+0x65/0xa0 [ 1599.963250] do_syscall_64+0x33/0x40 [ 1599.963563] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1599.963990] RIP: 0033:0x7f01c3a3bb19 [ 1599.964307] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1599.965985] RSP: 002b:00007f01c0fb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1599.967295] RAX: ffffffffffffffda RBX: 00007f01c3b4ef60 RCX: 00007f01c3a3bb19 [ 1599.968516] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1599.969736] RBP: 00007f01c0fb11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1599.971260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1599.972484] R13: 00007ffd92eb3b6f R14: 00007f01c0fb1300 R15: 0000000000022000 [ 1599.973450] FAULT_INJECTION: forcing a failure. [ 1599.973450] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1599.974972] CPU: 1 PID: 31479 Comm: syz-executor.0 Not tainted 5.10.225 #1 [ 1599.975557] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1599.976260] Call Trace: [ 1599.976494] dump_stack+0x107/0x167 [ 1599.976809] should_fail.cold+0x5/0xa [ 1599.977143] _copy_to_iter+0x264/0x12d0 [ 1599.977497] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1599.977934] ? __virt_addr_valid+0x170/0x5d0 [ 1599.978312] ? __check_object_size+0x319/0x440 [ 1599.978705] seq_read_iter+0xdcb/0x12b0 [ 1599.979059] seq_read+0x3dd/0x5b0 [ 1599.979356] ? seq_read_iter+0x12b0/0x12b0 [ 1599.979732] ? _cond_resched+0x12/0x80 [ 1599.980073] ? fsnotify_perm.part.0+0x22d/0x620 [ 1599.980476] ? seq_read_iter+0x12b0/0x12b0 [ 1599.980838] proc_reg_read+0x22a/0x300 [ 1599.981176] do_iter_read+0x4fa/0x760 [ 1599.981506] ? import_iovec+0x83/0xb0 [ 1599.981850] vfs_readv+0xe5/0x160 [ 1599.982148] ? vfs_iter_read+0xa0/0xa0 [ 1599.982482] ? __fdget_pos+0xf1/0x190 [ 1599.982808] ? lock_downgrade+0x6d0/0x6d0 [ 1599.983166] ? ksys_write+0x12d/0x260 [ 1599.983504] ? __fget_files+0x2f8/0x520 [ 1599.983863] do_readv+0x139/0x300 [ 1599.984158] ? vfs_readv+0x160/0x160 [ 1599.984478] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1599.984922] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1599.985361] do_syscall_64+0x33/0x40 [ 1599.985681] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1599.986129] RIP: 0033:0x7f56cd026b19 [ 1599.986447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1599.987991] RSP: 002b:00007f56ca59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1599.988637] RAX: ffffffffffffffda RBX: 00007f56cd139f60 RCX: 00007f56cd026b19 [ 1599.989234] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000004 [ 1599.989846] RBP: 00007f56ca59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1599.990456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1599.991058] R13: 00007ffe3189bb7f R14: 00007f56ca59c300 R15: 0000000000022000 13:45:55 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:45:55 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(0x0, r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:45:55 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) [ 1600.124273] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 1600.236278] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:46:09 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:46:09 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:46:09 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(0x0, r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:46:09 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 5) 13:46:09 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 5) 13:46:09 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 4) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:46:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x7ffff000}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:46:09 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) [ 1613.945193] FAULT_INJECTION: forcing a failure. [ 1613.945193] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1613.946607] CPU: 1 PID: 31729 Comm: syz-executor.0 Not tainted 5.10.225 #1 [ 1613.947241] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1613.947985] Call Trace: [ 1613.948243] dump_stack+0x107/0x167 [ 1613.948581] should_fail.cold+0x5/0xa [ 1613.948948] __alloc_pages_nodemask+0x182/0x600 [ 1613.949382] ? add_mm_counter_fast+0x220/0x220 [ 1613.949803] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1613.950377] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1613.950859] ? lock_downgrade+0x6d0/0x6d0 [ 1613.951245] ? mark_held_locks+0x9e/0xe0 [ 1613.951625] alloc_pages_vma+0xbb/0x410 [ 1613.952002] handle_mm_fault+0x152f/0x3500 [ 1613.952409] ? __pmd_alloc+0x5e0/0x5e0 [ 1613.952787] ? vmacache_find+0x55/0x2a0 [ 1613.953160] ? vmacache_update+0xce/0x140 [ 1613.953551] do_user_addr_fault+0x56e/0xc60 [ 1613.953968] exc_page_fault+0xa2/0x1a0 [ 1613.954339] asm_exc_page_fault+0x1e/0x30 [ 1613.954727] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1613.955228] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca e9 e3 db 1d 02 0f 1f 00 0f 01 [ 1613.956858] RSP: 0018:ffff88804e53f8c8 EFLAGS: 00050206 [ 1613.957341] RAX: 0000000000000001 RBX: 0000000000000bb5 RCX: 000000000000000e [ 1613.957993] RDX: 0000000000000005 RSI: ffff888048b4eb40 RDI: 0000000020001000 [ 1613.958637] RBP: 00000000200004c0 R08: 0000000000000000 R09: ffff888048b4ebb4 [ 1613.959281] R10: ffffed1009169d76 R11: 0000000000000001 R12: ffff888048b4e000 [ 1613.959929] R13: 0000000020001075 R14: 00007ffffffff000 R15: 0000000000000000 [ 1613.960606] copyout.part.0+0x10b/0x140 [ 1613.960974] _copy_to_iter+0x293/0x12d0 [ 1613.961347] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1613.961810] ? __virt_addr_valid+0x170/0x5d0 [ 1613.962218] ? __check_object_size+0x319/0x440 [ 1613.962750] seq_read_iter+0xdcb/0x12b0 [ 1613.963131] seq_read+0x3dd/0x5b0 [ 1613.963452] ? seq_read_iter+0x12b0/0x12b0 [ 1613.963684] FAULT_INJECTION: forcing a failure. [ 1613.963684] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1613.963845] ? _cond_resched+0x12/0x80 [ 1613.965160] ? fsnotify_perm.part.0+0x22d/0x620 [ 1613.965557] ? seq_read_iter+0x12b0/0x12b0 [ 1613.965947] proc_reg_read+0x22a/0x300 [ 1613.966294] do_iter_read+0x4fa/0x760 [ 1613.966626] ? import_iovec+0x83/0xb0 [ 1613.966981] vfs_readv+0xe5/0x160 [ 1613.967293] ? vfs_iter_read+0xa0/0xa0 [ 1613.967621] ? __fdget_pos+0xf1/0x190 [ 1613.967973] ? lock_downgrade+0x6d0/0x6d0 [ 1613.968361] ? ksys_write+0x12d/0x260 [ 1613.968694] ? __fget_files+0x2f8/0x520 [ 1613.969078] do_readv+0x139/0x300 [ 1613.969375] ? vfs_readv+0x160/0x160 [ 1613.969692] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1613.970158] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1613.970592] do_syscall_64+0x33/0x40 [ 1613.970922] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1613.971358] RIP: 0033:0x7f56cd026b19 [ 1613.971673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1613.973221] RSP: 002b:00007f56ca59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1613.973867] RAX: ffffffffffffffda RBX: 00007f56cd139f60 RCX: 00007f56cd026b19 [ 1613.974479] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000004 [ 1613.975085] RBP: 00007f56ca59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1613.975684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1613.976290] R13: 00007ffe3189bb7f R14: 00007f56ca59c300 R15: 0000000000022000 [ 1613.976928] CPU: 0 PID: 31728 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1613.977559] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1613.994387] Call Trace: [ 1613.994644] dump_stack+0x107/0x167 [ 1613.994980] should_fail.cold+0x5/0xa [ 1613.995342] _copy_to_iter+0x264/0x12d0 [ 1613.995725] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1613.996166] ? __virt_addr_valid+0x170/0x5d0 [ 1613.996573] ? __check_object_size+0x319/0x440 [ 1613.996996] seq_read_iter+0xdcb/0x12b0 [ 1613.997377] seq_read+0x3dd/0x5b0 [ 1613.997701] ? seq_read_iter+0x12b0/0x12b0 [ 1613.998115] ? _cond_resched+0x12/0x80 [ 1613.998484] ? fsnotify_perm.part.0+0x22d/0x620 [ 1613.998909] ? seq_read_iter+0x12b0/0x12b0 [ 1613.999293] proc_reg_read+0x22a/0x300 [ 1613.999663] do_iter_read+0x4fa/0x760 [ 1614.000034] ? import_iovec+0x83/0xb0 [ 1614.000382] vfs_readv+0xe5/0x160 [ 1614.000698] ? vfs_iter_read+0xa0/0xa0 [ 1614.001073] ? __fdget_pos+0xf1/0x190 [ 1614.001428] ? lock_downgrade+0x6d0/0x6d0 [ 1614.001819] ? ksys_write+0x12d/0x260 [ 1614.002213] ? __fget_files+0x2f8/0x520 [ 1614.002599] do_readv+0x139/0x300 [ 1614.002934] ? vfs_readv+0x160/0x160 [ 1614.003304] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1614.003787] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1614.004289] do_syscall_64+0x33/0x40 [ 1614.004636] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1614.005116] RIP: 0033:0x7f4158a73b19 [ 1614.005478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1614.007129] RSP: 002b:00007f4155fe9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1614.007818] RAX: ffffffffffffffda RBX: 00007f4158b86f60 RCX: 00007f4158a73b19 [ 1614.008466] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000004 [ 1614.009111] RBP: 00007f4155fe91d0 R08: 0000000000000000 R09: 0000000000000000 13:46:09 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 6) [ 1614.009757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1614.020080] R13: 00007fff8641640f R14: 00007f4155fe9300 R15: 0000000000022000 [ 1614.037446] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' [ 1614.067267] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 1614.074722] FAULT_INJECTION: forcing a failure. [ 1614.074722] name failslab, interval 1, probability 0, space 0, times 0 [ 1614.075692] CPU: 0 PID: 31718 Comm: syz-executor.2 Not tainted 5.10.225 #1 [ 1614.076271] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1614.076960] Call Trace: [ 1614.077191] dump_stack+0x107/0x167 [ 1614.077501] should_fail.cold+0x5/0xa [ 1614.077827] ? create_object.isra.0+0x3a/0xa20 [ 1614.078241] should_failslab+0x5/0x20 [ 1614.078567] kmem_cache_alloc+0x5b/0x310 [ 1614.078915] create_object.isra.0+0x3a/0xa20 [ 1614.079288] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1614.079720] kmem_cache_alloc+0x159/0x310 [ 1614.080078] ? strncpy_from_user+0x9e/0x470 [ 1614.080445] getname_flags.part.0+0x50/0x4f0 [ 1614.080821] getname_flags+0x9a/0xe0 [ 1614.081138] __x64_sys_rename+0x65/0xa0 [ 1614.081476] do_syscall_64+0x33/0x40 [ 1614.081791] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1614.082243] RIP: 0033:0x7f01c3a3bb19 [ 1614.082559] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1614.084101] RSP: 002b:00007f01c0fb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1614.084743] RAX: ffffffffffffffda RBX: 00007f01c3b4ef60 RCX: 00007f01c3a3bb19 [ 1614.085345] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1614.085974] RBP: 00007f01c0fb11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1614.086581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1614.087182] R13: 00007ffd92eb3b6f R14: 00007f01c0fb1300 R15: 0000000000022000 [ 1614.161390] FAULT_INJECTION: forcing a failure. [ 1614.161390] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1614.162973] CPU: 1 PID: 31823 Comm: syz-executor.0 Not tainted 5.10.225 #1 [ 1614.163582] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1614.164314] Call Trace: [ 1614.164561] dump_stack+0x107/0x167 [ 1614.164891] should_fail.cold+0x5/0xa [ 1614.165237] _copy_to_user+0x2e/0x180 [ 1614.165584] simple_read_from_buffer+0xcc/0x160 [ 1614.166040] proc_fail_nth_read+0x198/0x230 [ 1614.166429] ? proc_sessionid_read+0x230/0x230 [ 1614.166840] ? security_file_permission+0xb1/0xe0 [ 1614.167274] ? proc_sessionid_read+0x230/0x230 [ 1614.167683] vfs_read+0x228/0x620 [ 1614.168005] ksys_read+0x12d/0x260 [ 1614.168326] ? vfs_write+0xb10/0xb10 [ 1614.168667] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1614.169136] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1614.169600] do_syscall_64+0x33/0x40 [ 1614.173955] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1614.174434] RIP: 0033:0x7f56ccfd969c [ 1614.174769] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1614.176377] RSP: 002b:00007f56ca59c170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1614.177051] RAX: ffffffffffffffda RBX: 0000000000000bb5 RCX: 00007f56ccfd969c [ 1614.177680] RDX: 000000000000000f RSI: 00007f56ca59c1e0 RDI: 0000000000000005 [ 1614.178322] RBP: 00007f56ca59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1614.178951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1614.179581] R13: 00007ffe3189bb7f R14: 00007f56ca59c300 R15: 0000000000022000 13:46:09 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x38, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r3) connect$unix(r3, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:46:09 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) [ 1614.236292] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:46:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x8) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:46:23 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 6) 13:46:23 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x38, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r3) connect$unix(r3, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:46:23 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 5) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:46:23 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 13:46:23 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xbb5}], 0x1) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:46:23 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:46:23 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(0x0, r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) [ 1628.179293] FAULT_INJECTION: forcing a failure. [ 1628.179293] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1628.180685] CPU: 0 PID: 32062 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1628.181391] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1628.182206] Call Trace: [ 1628.182450] dump_stack+0x107/0x167 [ 1628.182818] should_fail.cold+0x5/0xa [ 1628.183232] __alloc_pages_nodemask+0x182/0x600 [ 1628.183627] ? add_mm_counter_fast+0x220/0x220 [ 1628.184105] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1628.184615] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1628.185184] ? lock_downgrade+0x6d0/0x6d0 [ 1628.185534] ? mark_held_locks+0x9e/0xe0 [ 1628.185993] alloc_pages_vma+0xbb/0x410 [ 1628.186345] handle_mm_fault+0x152f/0x3500 [ 1628.186747] ? __pmd_alloc+0x5e0/0x5e0 [ 1628.187150] ? vmacache_find+0x55/0x2a0 [ 1628.187487] ? vmacache_update+0xce/0x140 [ 1628.187934] do_user_addr_fault+0x56e/0xc60 [ 1628.188316] exc_page_fault+0xa2/0x1a0 [ 1628.188652] asm_exc_page_fault+0x1e/0x30 [ 1628.189137] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1628.189593] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca e9 e3 db 1d 02 0f 1f 00 0f 01 [ 1628.191341] RSP: 0018:ffff88804c60f8c8 EFLAGS: 00050206 [ 1628.191836] RAX: 0000000000000001 RBX: 0000000000000bb5 RCX: 000000000000000e [ 1628.192493] RDX: 0000000000000005 RSI: ffff88804b0a0b40 RDI: 0000000020001000 [ 1628.193212] RBP: 00000000200004c0 R08: 0000000000000000 R09: ffff88804b0a0bb4 [ 1628.193858] R10: ffffed1009614176 R11: 0000000000000001 R12: ffff88804b0a0000 [ 1628.194538] R13: 0000000020001075 R14: 00007ffffffff000 R15: 0000000000000000 [ 1628.195248] copyout.part.0+0x10b/0x140 [ 1628.195591] _copy_to_iter+0x293/0x12d0 [ 1628.196034] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1628.196450] ? __virt_addr_valid+0x170/0x5d0 [ 1628.196949] ? __check_object_size+0x319/0x440 [ 1628.197344] seq_read_iter+0xdcb/0x12b0 [ 1628.197701] seq_read+0x3dd/0x5b0 [ 1628.198114] ? seq_read_iter+0x12b0/0x12b0 [ 1628.198489] ? _cond_resched+0x12/0x80 [ 1628.198914] ? fsnotify_perm.part.0+0x22d/0x620 [ 1628.199318] ? seq_read_iter+0x12b0/0x12b0 [ 1628.199678] proc_reg_read+0x22a/0x300 [ 1628.200103] do_iter_read+0x4fa/0x760 [ 1628.200432] ? import_iovec+0x83/0xb0 [ 1628.200831] vfs_readv+0xe5/0x160 [ 1628.201181] ? vfs_iter_read+0xa0/0xa0 [ 1628.201509] ? __fdget_pos+0xf1/0x190 [ 1628.201937] ? lock_downgrade+0x6d0/0x6d0 [ 1628.202316] ? ksys_write+0x12d/0x260 [ 1628.202650] ? __fget_files+0x2f8/0x520 [ 1628.203099] do_readv+0x139/0x300 [ 1628.203396] ? vfs_readv+0x160/0x160 [ 1628.203752] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1628.206953] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1628.207403] do_syscall_64+0x33/0x40 [ 1628.207779] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1628.208273] RIP: 0033:0x7f4158a73b19 [ 1628.208593] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1628.210383] RSP: 002b:00007f4155fe9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1628.211120] RAX: ffffffffffffffda RBX: 00007f4158b86f60 RCX: 00007f4158a73b19 [ 1628.211792] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000004 [ 1628.212442] RBP: 00007f4155fe91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1628.213176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1628.213844] R13: 00007fff8641640f R14: 00007f4155fe9300 R15: 0000000000022000 13:46:23 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:46:23 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x200014b9}], 0x1) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:46:23 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xbb5}], 0x1) [ 1628.273042] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' [ 1628.283586] FAULT_INJECTION: forcing a failure. [ 1628.283586] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1628.284969] CPU: 0 PID: 32069 Comm: syz-executor.2 Not tainted 5.10.225 #1 [ 1628.285550] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1628.286257] Call Trace: [ 1628.286488] dump_stack+0x107/0x167 [ 1628.286805] should_fail.cold+0x5/0xa [ 1628.287135] strncpy_from_user+0x34/0x470 [ 1628.287491] getname_flags.part.0+0x95/0x4f0 [ 1628.287876] getname_flags+0x9a/0xe0 [ 1628.288195] __x64_sys_rename+0x65/0xa0 [ 1628.288535] do_syscall_64+0x33/0x40 [ 1628.288859] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1628.289295] RIP: 0033:0x7f01c3a3bb19 [ 1628.289612] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1628.291182] RSP: 002b:00007f01c0fb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1628.291834] RAX: ffffffffffffffda RBX: 00007f01c3b4ef60 RCX: 00007f01c3a3bb19 [ 1628.292442] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1628.293049] RBP: 00007f01c0fb11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1628.293653] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1628.294267] R13: 00007ffd92eb3b6f R14: 00007f01c0fb1300 R15: 0000000000022000 13:46:23 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:46:23 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x38, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r3) connect$unix(r3, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:46:23 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 7) 13:46:23 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x200014b9}], 0x1) 13:46:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0xf000) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 1628.457040] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:46:23 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) [ 1628.527392] FAULT_INJECTION: forcing a failure. [ 1628.527392] name failslab, interval 1, probability 0, space 0, times 0 [ 1628.528961] CPU: 0 PID: 32591 Comm: syz-executor.2 Not tainted 5.10.225 #1 [ 1628.529556] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1628.530284] Call Trace: [ 1628.530519] dump_stack+0x107/0x167 [ 1628.530834] should_fail.cold+0x5/0xa [ 1628.531175] ? jbd2__journal_start+0x190/0x7e0 [ 1628.531576] should_failslab+0x5/0x20 [ 1628.531906] kmem_cache_alloc+0x5b/0x310 [ 1628.532263] ? ext4_dx_find_entry+0x600/0x600 [ 1628.532656] jbd2__journal_start+0x190/0x7e0 [ 1628.533050] __ext4_journal_start_sb+0x214/0x390 [ 1628.533459] ext4_rename+0x96d/0x2bc0 [ 1628.533796] ? ext4_tmpfile+0x440/0x440 [ 1628.534153] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1628.534615] ? lock_acquire+0x197/0x470 [ 1628.534957] ? vfs_rename+0xcb5/0x1510 [ 1628.535304] ? lockref_get+0x11/0x50 [ 1628.535624] ? find_held_lock+0x2c/0x110 [ 1628.535985] ? down_write_nested+0xe4/0x160 [ 1628.536364] ext4_rename2+0x1af/0x240 [ 1628.536696] vfs_rename+0xd6c/0x1510 [ 1628.537026] ? vfs_unlink+0x8b0/0x8b0 [ 1628.537370] ? lookup_dcache+0x65/0x130 [ 1628.537720] do_renameat2+0xae1/0xbf0 [ 1628.538058] ? __ia32_sys_link+0x80/0x80 [ 1628.538430] ? __virt_addr_valid+0x170/0x5d0 [ 1628.538813] ? __check_object_size+0x319/0x440 [ 1628.539238] __x64_sys_rename+0x7d/0xa0 [ 1628.539583] do_syscall_64+0x33/0x40 [ 1628.539906] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1628.540343] RIP: 0033:0x7f01c3a3bb19 [ 1628.540664] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1628.542245] RSP: 002b:00007f01c0fb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1628.542899] RAX: ffffffffffffffda RBX: 00007f01c3b4ef60 RCX: 00007f01c3a3bb19 [ 1628.543508] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1628.544118] RBP: 00007f01c0fb11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1628.544724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1628.545331] R13: 00007ffd92eb3b6f R14: 00007f01c0fb1300 R15: 0000000000022000 13:46:37 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r3) connect$unix(r3, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:46:37 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x7ffff000}], 0x1) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:46:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0xfffff000) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:46:37 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:46:37 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:46:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 8) 13:46:37 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 6) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:46:37 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x7ffff000}], 0x1) [ 1642.188231] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' [ 1642.202362] FAULT_INJECTION: forcing a failure. [ 1642.202362] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1642.203641] CPU: 0 PID: 32924 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1642.204267] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1642.205007] Call Trace: [ 1642.205240] dump_stack+0x107/0x167 [ 1642.205548] should_fail.cold+0x5/0xa [ 1642.205922] _copy_to_user+0x2e/0x180 [ 1642.206257] simple_read_from_buffer+0xcc/0x160 [ 1642.206681] proc_fail_nth_read+0x198/0x230 [ 1642.207097] ? proc_sessionid_read+0x230/0x230 [ 1642.207487] ? security_file_permission+0xb1/0xe0 [ 1642.207970] ? proc_sessionid_read+0x230/0x230 [ 1642.208358] vfs_read+0x228/0x620 [ 1642.208656] ksys_read+0x12d/0x260 [ 1642.209018] ? vfs_write+0xb10/0xb10 [ 1642.209342] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1642.209786] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1642.210280] do_syscall_64+0x33/0x40 [ 1642.210606] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1642.211082] RIP: 0033:0x7f4158a2669c [ 1642.211398] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1642.213195] RSP: 002b:00007f4155fe9170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1642.213841] RAX: ffffffffffffffda RBX: 0000000000000bb5 RCX: 00007f4158a2669c [ 1642.214611] RDX: 000000000000000f RSI: 00007f4155fe91e0 RDI: 0000000000000005 [ 1642.215363] RBP: 00007f4155fe91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1642.216132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1642.216732] R13: 00007fff8641640f R14: 00007f4155fe9300 R15: 0000000000022000 13:46:37 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:46:37 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) [ 1642.280974] FAULT_INJECTION: forcing a failure. [ 1642.280974] name failslab, interval 1, probability 0, space 0, times 0 [ 1642.282252] CPU: 0 PID: 32943 Comm: syz-executor.2 Not tainted 5.10.225 #1 [ 1642.282918] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1642.283635] Call Trace: [ 1642.283912] dump_stack+0x107/0x167 [ 1642.284243] should_fail.cold+0x5/0xa [ 1642.284580] ? create_object.isra.0+0x3a/0xa20 [ 1642.285027] should_failslab+0x5/0x20 [ 1642.285361] kmem_cache_alloc+0x5b/0x310 [ 1642.285718] ? __ext4_find_entry+0x9f8/0xfc0 [ 1642.286152] create_object.isra.0+0x3a/0xa20 [ 1642.286533] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1642.287038] kmem_cache_alloc+0x159/0x310 [ 1642.287391] ? ext4_dx_find_entry+0x600/0x600 [ 1642.287778] jbd2__journal_start+0x190/0x7e0 [ 1642.288213] __ext4_journal_start_sb+0x214/0x390 [ 1642.288620] ext4_rename+0x96d/0x2bc0 [ 1642.288998] ? ext4_tmpfile+0x440/0x440 [ 1642.289340] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1642.289793] ? lock_acquire+0x197/0x470 [ 1642.290174] ? vfs_rename+0xcb5/0x1510 [ 1642.290531] ? lockref_get+0x11/0x50 [ 1642.290847] ? find_held_lock+0x2c/0x110 [ 1642.294428] ? down_write_nested+0xe4/0x160 [ 1642.299843] ext4_rename2+0x1af/0x240 [ 1642.300423] vfs_rename+0xd6c/0x1510 [ 1642.300747] ? vfs_unlink+0x8b0/0x8b0 [ 1642.301222] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1642.301695] do_renameat2+0xae1/0xbf0 [ 1642.302419] ? __ia32_sys_link+0x80/0x80 [ 1642.302779] ? __virt_addr_valid+0x170/0x5d0 [ 1642.303155] ? __check_object_size+0x319/0x440 [ 1642.303570] __x64_sys_rename+0x7d/0xa0 [ 1642.303910] do_syscall_64+0x33/0x40 [ 1642.304226] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1642.304657] RIP: 0033:0x7f01c3a3bb19 [ 1642.304975] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1642.306537] RSP: 002b:00007f01c0fb1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1642.307181] RAX: ffffffffffffffda RBX: 00007f01c3b4ef60 RCX: 00007f01c3a3bb19 [ 1642.307784] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1642.308384] RBP: 00007f01c0fb11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1642.308985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1642.309583] R13: 00007ffd92eb3b6f R14: 00007f01c0fb1300 R15: 0000000000022000 13:46:37 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x2) 13:46:37 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x2) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:46:37 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r3) connect$unix(r3, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:46:37 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:46:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0xfffffffffffff000) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 1642.374256] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:46:51 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:46:51 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xbb5}], 0x1) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:46:51 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x3) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:46:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 9) 13:46:51 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:46:51 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x3) 13:46:51 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r3) connect$unix(r3, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:46:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x20, 0x2, 0x6, 0x7, 0x0, 0x6, 0xd84, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x2, @perf_config_ext={0x1c99, 0x8}, 0x42408, 0xffffffffffff0000, 0x9, 0x1, 0xf99, 0x0, 0x6, 0x0, 0x7fff, 0x0, 0x54}, 0x0, 0x4, 0xffffffffffffffff, 0x3) chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x30001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:46:51 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) [ 1656.266166] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 1656.272087] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' [ 1656.281403] FAULT_INJECTION: forcing a failure. [ 1656.281403] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1656.282659] CPU: 0 PID: 33668 Comm: syz-executor.2 Not tainted 5.10.225 #1 [ 1656.283340] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1656.284744] Call Trace: [ 1656.285034] dump_stack+0x107/0x167 [ 1656.285351] should_fail.cold+0x5/0xa [ 1656.285680] _copy_to_user+0x2e/0x180 [ 1656.286059] simple_read_from_buffer+0xcc/0x160 [ 1656.286466] proc_fail_nth_read+0x198/0x230 [ 1656.286868] ? proc_sessionid_read+0x230/0x230 [ 1656.287335] ? security_file_permission+0xb1/0xe0 [ 1656.287753] ? proc_sessionid_read+0x230/0x230 [ 1656.288191] vfs_read+0x228/0x620 [ 1656.288491] ksys_read+0x12d/0x260 [ 1656.288794] ? vfs_write+0xb10/0xb10 [ 1656.289174] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1656.289616] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1656.290104] do_syscall_64+0x33/0x40 [ 1656.290422] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1656.290888] RIP: 0033:0x7f01c39ee69c [ 1656.291626] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1656.295130] RSP: 002b:00007f01c0fb1170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1656.296851] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f01c39ee69c [ 1656.298516] RDX: 000000000000000f RSI: 00007f01c0fb11e0 RDI: 0000000000000005 [ 1656.300203] RBP: 00007f01c0fb11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1656.301818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1656.303516] R13: 00007ffd92eb3b6f R14: 00007f01c0fb1300 R15: 0000000000022000 13:46:51 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4) 13:46:51 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:46:51 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x3c, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:46:51 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:46:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) stat(&(0x7f0000000000)='mnt/encrypted_dir\x00', &(0x7f0000000080)) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 1656.428121] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 1656.445209] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:46:51 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:46:51 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x200014b9}], 0x1) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:46:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:46:51 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:46:51 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) [ 1656.595285] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 1656.640151] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:47:06 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x8) 13:47:06 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x3c, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:47:06 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5e, 0x30014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x800, 0x80, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) umount2(&(0x7f0000000000)='./file2\x00', 0x1) 13:47:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:47:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f00000003c0)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb306d4aa981c4db732ff2ba351c30c7fab9844affb826bda0425c70ac9b7486add0be69f433963933157dd17c5f37b0e00df5b0d5998acfa726fe41"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:47:06 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x7ffff000}], 0x1) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:47:06 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:47:06 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x8) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) [ 1671.270964] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:47:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:47:21 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x2) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:47:21 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x3c, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:47:21 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='./file2\x00') chdir(&(0x7f0000000240)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r1, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000380)={0x4, 0x80, 0x6, 0x6, 0x7, 0x9, 0x0, 0x331, 0x109a18, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x3, 0x7}, 0x10880, 0xa92, 0x7ff, 0x5, 0x8000, 0x3, 0x3f, 0x0, 0xfffff9e3, 0x0, 0x101}, 0xffffffffffffffff, 0x0, r0, 0xa) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000400)={{0x1, 0x1, 0x18, r2, {r3, 0xee00}}, 'mnt/encrypted_dir\x00'}) mount$cgroup(0x0, &(0x7f0000000440)='./file1\x00', &(0x7f0000000480), 0x480480, &(0x7f0000000500)={[{@none}, {@noprefix}, {@xattr}, {@clone_children}, {}, {@noprefix}, {}], [{@fowner_eq}, {@obj_role={'obj_role', 0x3d, 'vfat\x00'}}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, '@'}}, {@fowner_gt={'fowner>', r3}}]}) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:47:21 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:47:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7, 0x1, 0xad, 0xc9, 0x0, 0x7, 0xa02, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000000), 0x9}, 0x1000, 0x4, 0x7, 0x2, 0x8000, 0xa0, 0x3, 0x0, 0x1d9c, 0x0, 0x8}, 0x0, 0xe, 0xffffffffffffffff, 0x8) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:47:21 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x9) 13:47:21 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:47:21 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x9) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) [ 1686.230509] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:47:21 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRES32]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:47:21 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) [ 1686.336412] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ' 13:47:21 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa) 13:47:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') mount$9p_xen(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x40412, &(0x7f0000000100)={'trans=xen,', {[{@privport}, {@uname={'uname', 0x3d, '9p\x00'}}, {@privport}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl}], [{@hash}, {@subj_user={'subj_user', 0x3d, '{%'}}, {@dont_measure}]}}) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 13:47:21 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:47:21 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRES32]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) [ 1686.421000] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:47:21 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) [ 1686.463510] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ' 13:47:21 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x2) 13:47:21 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x3) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:47:21 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf) [ 1686.614972] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:47:35 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x63) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:47:35 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRES32]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:47:35 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$9p_fd(0x0, &(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000700), 0x400, &(0x7f0000000980)=ANY=[@ANYBLOB="3b65ca20857472616e733d66642c72", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',mmap,permit_directio,context=unconfined_u,dont_appraise,obj_user=9p\x00,\x00']) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000800)='mnt/encrypted_dir\x00', 0x40000000000, 0x0, 0x0, 0x118008, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f727439307830306532342c74696d658110eb30303030ac00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000002c0)='mnt/encrypted_dir\x00', 0x8ffd, 0x3, &(0x7f00000005c0)=[{&(0x7f0000000380)="ed1e4eab9b2837f925dfd2f034c96d05072f21282650dd8c8d5fc46cd56eafee864459380e3ee171624c81cb1d435cdb2ead375a418f847b8f3e87cd4599aaa9d02f25dade202a6d83c2e0ecc00852b6", 0x50, 0xffffffffffffffad}, {&(0x7f0000000500)="e76f58979e25c06ddc2cd32fc903fd1d3f001a16f0616ea734b132535c11fd0e22691dc233e1b09eb26960f11b468f2eb7dbd9ea0befaef35373cc0e1ebb54f29a1a4e618c8c16cefca7f895b015e1e9bf99dca2064c23b3590a5856549577f1449ed04e57d0d9ec55891e5e7b4089b891a22b31012c88050d2fb9c952d5fe1228", 0x81, 0x1}, {&(0x7f0000000400)="ae10173fb644c6984d821df1fe2186c3a5a608948ec6c8fef7cdb7514553aa8f321abca17f8665fd5403", 0x2a, 0x100}], 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="73686f72746e616d653d6c65722c7375626a5f726f6c653d3132372e302e302e31002c61707072616973655f747970653d696d617369672c646f6e745f6d6561737572652c7375626a44757365723d07000000281c2cc675626a5f74491f653d6e65742f69636d7036002c7065726d69745f646972656374696f2c657569643d7118e9a48c7a211eb4dd4d933682d60e4c66e183d3fc5f64b6920befbfe7e6cb057814e2832756e1dda4b5791b586faee16133d79823829d505402de145ca35b595da25ec8c062db96ab23d38195b7430000", @ANYRESDEC, @ANYBLOB=',subj_type=127.0.0.1\x00,hash,appraise_type=imasig,\x00']) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) llistxattr(&(0x7f0000000740)='./file0\x00', &(0x7f0000000a40)=""/152, 0x98) acct(&(0x7f0000000100)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1700.780711] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ' 13:47:35 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x63) 13:47:35 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:47:35 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x2) 13:47:35 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:47:35 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file2\x00', 0x55) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 1700.805077] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:47:36 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:47:36 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x2) [ 1700.888125] tmpfs: Unknown parameter 'ÿÿ0177777777777777777777718446744073709551615' 13:47:36 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:47:36 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:47:36 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x44c) [ 1701.002538] tmpfs: Unknown parameter 'ÿÿ0177777777777777777777718446744073709551615' [ 1701.005159] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:47:36 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x44c) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:47:36 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:47:36 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) [ 1701.121381] tmpfs: Unknown parameter 'ÿÿ0177777777777777777777718446744073709551615' 13:47:36 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x8) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) [ 1701.158506] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:47:36 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x44e) 13:47:36 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:47:36 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) r1 = getegid() lstat(&(0x7f0000000000)='./file1\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000100)=[r2, r1, r1]) chown(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, r1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) stat(&(0x7f0000000240)='./file2\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) stat(&(0x7f00000000c0)='mnt/encrypted_dir\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3, {r4, r5}}, 'mnt/encrypted_dir\x00'}) 13:47:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) getresuid(&(0x7f00000006c0)=0x0, &(0x7f0000000700), &(0x7f0000000740)) r1 = getegid() lstat(&(0x7f0000000000)='./file1\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000100)=[r2, r1, r1]) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0)=0x0, &(0x7f0000000c00)) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)=[{{&(0x7f0000000c40)=@abs, 0x6e, &(0x7f0000001080)=[{&(0x7f0000000cc0)=""/228, 0xe4}, {&(0x7f0000000dc0)=""/206, 0xce}, {&(0x7f0000000ec0)=""/174, 0xae}, {&(0x7f0000000f80)=""/212, 0xd4}], 0x4}}, {{0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000010c0)=""/234, 0xea}, {&(0x7f00000011c0)=""/106, 0x6a}, {&(0x7f0000001240)=""/255, 0xff}, {&(0x7f0000001340)=""/65, 0x41}], 0x4, &(0x7f0000001400)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000800)=""/80, 0x50}, {&(0x7f00000014c0)=""/208, 0xd0}, {&(0x7f00000015c0)=""/185, 0xb9}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/106, 0x6a}, {&(0x7f0000002e00)=""/4096, 0x1000}], 0x6, &(0x7f0000001780)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x98}}, {{&(0x7f0000001840)=@abs, 0x6e, &(0x7f0000000a00)=[{&(0x7f00000018c0)=""/136, 0x88}, {&(0x7f0000001980)=""/170, 0xaa}, {&(0x7f0000003e00)=""/4096, 0x1000}, {&(0x7f0000000880)=""/162, 0xa2}, {&(0x7f0000004e00)=""/4096, 0x1000}, {&(0x7f0000000940)=""/98, 0x62}, {&(0x7f00000009c0)=""/27, 0x1b}], 0x7, &(0x7f0000001a80)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0xb0}}], 0x4, 0x0, &(0x7f0000001c80)={0x77359400}) lsetxattr$system_posix_acl(&(0x7f0000000400)='./file0\x00', &(0x7f0000000600)='system.posix_acl_access\x00', &(0x7f0000001cc0)={{}, {0x1, 0x1}, [{0x2, 0x1, r0}], {0x4, 0x4}, [{0x8, 0x6, r1}, {0x8, 0x0, r3}, {0x8, 0x7, 0xffffffffffffffff}, {0x8, 0x7, 0xee01}, {0x8, 0x6, r4}], {0x10, 0x2}, {0x20, 0x9}}, 0x54, 0x3) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r5, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) recvmsg$unix(r5, &(0x7f00000002c0)={&(0x7f0000000380)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000500)=""/231, 0xe7}], 0x1}, 0x40000000) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1701.230422] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 13:47:36 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:47:36 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x44e) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) [ 1701.244199] tmpfs: Unknown parameter 'ÿÿÿÿÿÿ18446744073709551615' [ 1701.301193] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' [ 1715.320061] tmpfs: Unknown parameter 'ÿÿÿÿÿÿ18446744073709551615' 13:47:50 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:47:50 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x9) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:47:50 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x46f) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:47:50 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:47:50 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:47:50 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x46f) 13:47:50 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = openat$cgroup_ro(r1, &(0x7f0000000240)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r1, {r0}}, './file0\x00'}) 13:47:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) chdir(&(0x7f0000000000)='./file2\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 1715.366994] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:48:04 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:48:04 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) [ 1729.185471] tmpfs: Unknown parameter 'ÿÿÿÿÿÿ18446744073709551615' [ 1729.237665] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:48:04 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:48:04 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x471) 13:48:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, @perf_config_ext, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x80, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f00000002c0)='./mnt\x00', 0x5, 0x3, &(0x7f0000000540)=[{&(0x7f0000000380)="31d46076887158d0acea3fc557d6b14a243787262f480969a2a99e8e8bedd3c37e8ef4996a65aad8d6b50bd8c65f8e676a8248ae308595f0fab889e19f20833c30b395dfaf20df1bc9c52bcdb2639c0c961e40f963f464e3ad45fafce123f5804b52b750375c6b", 0x67, 0x10000}, {&(0x7f0000000400)="1e34272f8bfb86b7528c3daa70951747e8a43fdd4d", 0x15, 0x7fff}, {&(0x7f0000000500)="ebe16cbc402e0aad0ca718c8c80f7fffaeb68180341eb0595a9863fc64dec7bc44fd22117a6158", 0x27, 0x2}], 0x1, &(0x7f00000005c0)={[{@grpjquota}, {@usrjquota}, {@nodiscard}, {@init_itable_val={'init_itable', 0x3d, 0xf3}}], [{@obj_user={'obj_user', 0x3d, 'net/icmp6\x00'}}, {@appraise}]}) openat(r1, &(0x7f00000006c0)='./file0\x00', 0x40480, 0x100) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') openat(r0, &(0x7f0000000700)='mnt/encrypted_dir\x00', 0x80040, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r2, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:48:04 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:48:04 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r2, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r2, 0x0) mkdirat(r2, &(0x7f00000001c0)='./file0\x00', 0x10) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r3, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000000)={r0, 0x2, 0x1, 0x6}) renameat2(r4, &(0x7f0000000080)='./file0\x00', r3, &(0x7f00000000c0)='mnt/encrypted_dir\x00', 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r5, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r5, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x32, 0x5, 0x4, 0x1f, 0x0, 0x2b0c, 0x2000, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x40, 0x4, @perf_config_ext={0x6162, 0xc4d}, 0x100, 0x8, 0x1ff, 0x8, 0x3, 0x9, 0x2, 0x0, 0x9, 0x0, 0xe0e3}, 0xffffffffffffffff, 0x6, r5, 0x8) 13:48:04 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x471) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:48:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) [ 1729.263411] tmpfs: Unknown parameter '01777777777777777777777ÿÿÿÿ18446744073709551615' [ 1729.316986] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:48:04 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:48:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) [ 1729.396831] cgroup: fork rejected by pids controller in /syz4 13:48:04 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) [ 1729.433694] tmpfs: Unknown parameter '01777777777777777777777ÿÿÿÿ18446744073709551615' 13:48:04 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x492) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:48:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:48:04 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x492) [ 1729.509433] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:48:04 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x63) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) [ 1729.540704] tmpfs: Unknown parameter '01777777777777777777777ÿÿÿÿ18446744073709551615' 13:48:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000580)='mnt/encrypted_dir\x00', 0x0, 0x50, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e6661f80100"/23, 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0xffffff09, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/stat\x00', 0x0, 0x0) openat(r2, &(0x7f0000000540)='./file1\x00', 0x41, 0x12b) fallocate(r1, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3}, './mnt\x00'}) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f00000003c0)=ANY=[@ANYBLOB="7478303063228fe26f9c4dd5194a6532342c74696d658110eb303030b02c0017343c6d3e72e698b34e67e3e25541703f70a7c6fb38e4cdc1201082116971ad743f224ea09ebd7fd8a7ac18eb96602a8cdac25bab38000031fde2dadf7faa76d7b0553d8400"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='projid_map\x00') readv(r4, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000240)={0xfffffffffffff801, 0x7}) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000380)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file1\x00') 13:48:04 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:48:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:48:04 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_io_uring_setup(0x620e, &(0x7f0000000180)={0x0, 0x4ac1, 0x0, 0x0, 0x2df}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a64485f108d23b76be1cc06a8682449c18157c739b4f25f709ca", 0x1a}, {0x0}, {0x0}], 0x3}}, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x1ff, @private1, 0x8}, 0x1c) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r4, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r4, 0xc018937a, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x1000}}, './file0\x00'}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f0000000340)={@desc={0x1, 0x0, @auto="4b082c075c9ca311"}}) recvmmsg$unix(r4, &(0x7f0000007900)=[{{&(0x7f00000003c0)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/125, 0x7d}, {&(0x7f00000000c0)=""/19, 0x13}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/248, 0xf8}, {&(0x7f00000002c0)=""/54, 0x36}, {&(0x7f0000000580)=""/43, 0x2b}, {&(0x7f0000001940)=""/220, 0xdc}, {&(0x7f0000001a40)=""/219, 0xdb}], 0x8, &(0x7f0000001b40)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x110}}, {{&(0x7f0000000880), 0x6e, &(0x7f0000003100)=[{&(0x7f0000001c80)=""/192, 0xc0}, {&(0x7f0000000800)=""/23, 0x17}, {&(0x7f0000001e00)=""/78, 0x4e}, {&(0x7f0000001d40)}, {&(0x7f0000001e80)=""/219, 0xdb}, {&(0x7f0000001f80)=""/4096, 0x1000}, {&(0x7f0000002f80)=""/109, 0x6d}, {&(0x7f0000003000)=""/29, 0x1d}, {&(0x7f0000003040)=""/24, 0x18}, {&(0x7f0000003080)=""/91, 0x5b}], 0xa}}, {{&(0x7f00000031c0)=@abs, 0x6e, &(0x7f0000003400)=[{&(0x7f0000003240)=""/213, 0xd5}, {&(0x7f0000003340)=""/169, 0xa9}], 0x2, &(0x7f0000003440)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x160}}, {{0x0, 0x0, &(0x7f0000005980)=[{&(0x7f00000035c0)=""/53, 0x35}, {&(0x7f0000003600)=""/4096, 0x1000}, {&(0x7f0000004600)=""/147, 0x93}, {&(0x7f00000046c0)=""/196, 0xc4}, {&(0x7f00000047c0)=""/53, 0x35}, {&(0x7f0000004800)=""/88, 0x58}, {&(0x7f0000004880)=""/4096, 0x1000}, {&(0x7f0000005880)=""/32, 0x20}, {&(0x7f00000058c0)=""/129, 0x81}], 0x9, &(0x7f0000005a40)=[@rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x138}}, {{0x0, 0x0, &(0x7f0000005dc0)=[{&(0x7f0000005bc0)=""/48, 0x30}, {&(0x7f0000005c00)=""/236, 0xec}, {0xffffffffffffffff}, {&(0x7f0000005d00)=""/173, 0xad}], 0x4}}, {{&(0x7f0000005e00)=@abs, 0x6e, &(0x7f0000007140)=[{&(0x7f0000005e80)=""/249, 0xf9}, {&(0x7f0000005f80)}, {&(0x7f0000005fc0)=""/4096, 0x1000}, {&(0x7f0000006fc0)=""/119, 0x77}, {&(0x7f0000007040)=""/13, 0xd}, {&(0x7f0000007080)=""/29, 0x1d}, {&(0x7f00000070c0)=""/61, 0x3d}, {&(0x7f0000007100)=""/4, 0x4}], 0x8, &(0x7f00000071c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x110}}, {{&(0x7f0000007300), 0x6e, &(0x7f0000007500)=[{&(0x7f0000007380)=""/129, 0x81}, {&(0x7f0000007440)=""/181, 0xb5}], 0x2, &(0x7f0000007b80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000410100000002000000b9bdc8c9ac17886d3b87a4e76f858809d3b0eaf3cb433b1e81be63476e0461d3d3ede1e294647953d1353ef18fe9f7d68ef7d384bd438a0075b61a585fe3e19d167deb24e891a7b76f7409be5800d021a204177b0d55a7649acb07285b713c1e02621866339668c933da56e2379532d9d859503ffcb050e54ee2b294", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x120}}, {{0x0, 0x0, &(0x7f00000077c0)=[{&(0x7f0000007680)=""/86, 0x56}, {&(0x7f0000007700)=""/32, 0x20}, {&(0x7f0000007740)=""/82, 0x52}], 0x3, &(0x7f0000007800)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xd0}}], 0x8, 0x2000, &(0x7f0000007b00)={0x77359400}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r6, 0xc018937c, &(0x7f0000007b40)={{0x1, 0x1, 0x18, r4, {0x4}}, 'mnt/encrypted_dir\x00'}) 13:48:04 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, 0x0, 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) [ 1729.695000] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' [ 1729.734438] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 1729.816664] kauditd_printk_skb: 6 callbacks suppressed [ 1729.816675] audit: type=1400 audit(1725803285.025:24): avc: denied { write } for pid=38050 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 13:48:18 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400200, 0x80) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:48:18 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x2) 13:48:18 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, 0x0, 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:48:19 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x494) 13:48:18 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x494) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:48:19 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x44c) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:48:19 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:48:19 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000380), &(0x7f00000003c0)='mnt/encrypted_dir\x00', 0x12, 0x2) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616eff0300006d612c706f72743d307830106532342c74696d658110eb303030475b7b"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)=""/22, 0x16) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1743.840311] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:48:19 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x2) [ 1743.926220] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:48:19 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, 0x0, 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) [ 1744.044907] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' [ 1744.046658] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:48:32 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x2) 13:48:32 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x200, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mknodat(r0, &(0x7f00000008c0)='./file0\x00', 0x400, 0x80000000) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f00000002c0)='./file0\x00', 0x0, 0x8, &(0x7f00000009c0)=[{&(0x7f0000000380)="1f938b1773763c1af7da1b6af529954cf07ffa18208e24d8ba4db062901044b001c6b9eb7763ec4453566a97d10519683194866ee0664151213e9fb0e80a6bf102b747765809e7f0815a5f491b1c580931f818f27339d0671a1c4572683a8158a4c933bc3d421264d89c81e5e6124ec8e3740cd1ef6df4ac161a7baa8546a62edd8c124ca742cf22066c34bf633744810652242cfdf491edd808622c6e1df2dc2727a7f554a834b5d3ca99c71d", 0xad, 0x5801}, {&(0x7f0000000500)="7cb72e5b3489029b2481fe7e4fb025f4767a81fe04a7e22fb9fb8ac984460362ec24699f184a6386723672a642273486340f4c379f0bb0ea6287382a337306c61f785b7c9ac05819da1ce33c6c18eae3f8e0e2268098164c2bf57a4b2f72e3603b6ddf93b9fbaebe272ef4eff477a907255ac30775d6809b", 0x78, 0xc5}, {&(0x7f00000006c0)="f9ec858853506514040815b4491cf28d1f6d70576ee84fab855a2dfdb67da043282f43ef2323fee34bebf6efdec3eeaf35a05620a456dfe0979acd60a589fcd2bef05c93e9a1278223050bf74f2cf2d948c07f80dfc6ac146940cc6c35334ccdc5a5cb9b62cd486d999af92d2eb3e810009dc930b61fe24c81e78fa30afc93de47128f0abf2ede391e7f927fcee20f24494d8d1a173bd01652e69de26405cc6cb3384339fb8941b52ec035344fbd3e55adff420183d5b5174beced4baabf59d688dbee9ba5a244291c7fd6d2eb28ca9d35b80e0ecf5e01def1779735f13eab9edd273da2fe5e6879e8dbaa", 0xeb, 0x20}, {&(0x7f0000000580)="87d9df881aab28cdf311e657e5c52e153a59c1e49416a9e3838af8feac2256b44f0202d6ae76ce597ca6241b0f22881e731b08e2379d", 0x36, 0x7}, {&(0x7f00000005c0)="93256c856f137edd640b8513b77e3c5f973167655457a69a8211314deadd533d55c162ac51d3bc0992e57139a04e3078f9a98aecd0c8635cdf99d55426b5a72c0fc1e7f36cff41868b0e32fd95cd0456730504b20ec3ab803d24d2b56ed5", 0x5e}, {&(0x7f0000000800)="125246f06e00737bf8299ff4d2d4c146195d289e8edfb2860b38a0729c7a7d7c9093da5bbe29c53d9547b8d96e60f460fcddbe4141967f5f9323704ff88149fae2984ead8cbe6964a482cc90ed97106b8383dc6fc7485be6b42620db2ce4842d186303b260f0d5b3a987cb1955a7990e4b15fbc1ee4f017945f6a31c6439c625bc491cbf491ce9", 0x87, 0x9}, {&(0x7f00000008c0), 0x0, 0xfae6}, {&(0x7f0000000900)="05fd36a32135bf47fd5c82cd4088990ce25af24c211b44974272cc59822e1bddd8ff670d08e80089f233cac334bdb3d5d73fc2de15b21266d8c41f462e8e2b2d6e9de85017723b7b4ebe8adc4f52f569ded670fee40af14f4b2c7c7aedf6ec4403a4ad94a95a91ef5a454e9eca5bb2419320bcbfe1447f0a365752e8bd2d665440ea1e75b19a6d5a829ef40bc413fe54d0de6c0dfe48c5ea292ed389edddad", 0x9f, 0x9cdd}], 0x1, &(0x7f0000000a80)={[{@gid={'gid', 0x3d, 0xee01}}, {@sbsector={'sbsector', 0x3d, 0x8}}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@smackfsroot={'smackfsroot', 0x3d, ']'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@obj_user={'obj_user', 0x3d, '}'}}, {@seclabel}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb30303030f700"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:48:32 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, 0x0, 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:48:32 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4b5) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:48:32 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4b5) 13:48:32 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x44e) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:48:32 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, 0x0, 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:48:32 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x7f, 0x5}}, './file2\x00'}) chdir(&(0x7f0000000300)='./file2\x00') r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) openat(r1, &(0x7f00000000c0)='./file2\x00', 0x220200, 0x11) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r2, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 1757.669477] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1757.673634] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 1757.677527] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:48:32 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4b7) 13:48:32 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, 0x0, 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:48:33 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:48:33 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4d8) 13:48:33 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, 0x0, 0x2) 13:48:33 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4b7) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) [ 1757.880557] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:48:33 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x1104803, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x480000, 0x0) mkdirat(r1, &(0x7f0000000080)='./file1\x00', 0x40) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') unlinkat(r0, &(0x7f0000000140)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') fsetxattr$trusted_overlay_redirect(r1, &(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x8, 0x2) readv(r2, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:48:33 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext={0x400000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633db439057ee9e21e6c33173b13c83dc32172646d612c706f72743d3078303465"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') openat(r0, &(0x7f0000000240)='./file2\x00', 0x84000, 0xdd) 13:48:33 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x46f) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:48:33 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) [ 1757.967125] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' [ 1758.010463] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:48:33 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r0, 0x0, 0x0, 0x1000002) mmap$IORING_OFF_SQ_RING(&(0x7f0000998000/0x2000)=nil, 0x2000, 0x1000004, 0x10, r0, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x5, 0x2, 0x9, 0x9, 0x0, 0xfffffffffffffe00, 0x10206, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp, 0x2343, 0x1, 0x3, 0x6, 0x8, 0x6, 0x0, 0x0, 0x13, 0x0, 0x1}, 0x0, 0x7, r0, 0xb) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x8802, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000140)={0x1, 0x0, 0xb4, 0x4}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r2, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:48:33 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4da) 13:48:33 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, 0x0, 0x2) [ 1758.146418] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:48:46 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4d8) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:48:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x292300c, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) syz_io_uring_setup(0xc0, &(0x7f0000000380)={0x0, 0x3c2d, 0x1, 0x0, 0x1db}, &(0x7f00004c3000/0x2000)=nil, &(0x7f000006f000/0x3000)=nil, &(0x7f0000000240), &(0x7f00000002c0)) fallocate(r0, 0x0, 0x0, 0x1000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000500)='127.0.0.1\x00', &(0x7f0000000540)='./mnt\x00', 0xffffffffffffffff) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x8000) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:48:47 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) r1 = mq_open(&(0x7f00000001c0)='smackfsroot', 0x40, 0x80, &(0x7f0000000200)={0xffffffffffffa095, 0x9, 0xffffffffdc830b5b, 0x6}) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000340)="adaa6b9adad7c88b2ab025e15f07c39ebbd00a44d9812bc14082360d056d211772da80677b0562c3e1c0c29043cdd20355f8472f741480fadb2487f6aec3d44e80531f7fe2f4d54f28e2b47862ed2bac891773bd6fa572d89ffeeb250ed5df76a1d48acce81525537f581bb170a0158678049b8e689f2c64320b5923dad952bb18ff585cec011d49adc85eee5af09b593543d00ba5caedc0fdbde07d99fd53242a808fb86660836b96fc6461b106e378556c76b3acb49e844b91bf6676d99adb009a64d8d9cfd58f3239765a3aec0b0420a34f7bed3478d7415ff8e82d5af836b20f44c54dfa650526f0b6f869030d88d747329eec7bca4ee504503b723f3b0c") mount$9p_xen(&(0x7f0000000000), &(0x7f0000000080)='mnt/encrypted_dir/file0\x00', &(0x7f00000000c0), 0x200814, &(0x7f0000000100)={'trans=xen,', {[{@cachetag={'cachetag', 0x3d, 'net/icmp6\x00'}}, {@cachetag}, {@debug={'debug', 0x3d, 0x2}}, {@cache_none}, {@version_L}], [{@smackfsroot={'smackfsroot', 0x3d, '%${'}}]}}) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:48:47 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, 0x0, 0x2) 13:48:47 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x471) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:48:47 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4fb) 13:48:47 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:48:47 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) [ 1771.849625] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 1771.861520] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:48:47 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:48:47 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r1 = open_tree(r0, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x1801) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000080)={'bond0\x00'}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/sctp\x00') readv(r2, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:48:47 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x0) 13:48:47 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4fd) 13:48:47 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x492) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:48:47 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:48:47 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4da) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) [ 1772.034066] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 1772.042341] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:49:00 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(0x0, 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) [ 1785.735117] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:49:00 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x51e) 13:49:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0xe, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r0]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r2, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:49:00 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4fb) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:49:00 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x0) 13:49:00 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') readv(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r0, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) mknodat$loop(r0, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x10, 0x1) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:49:00 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x494) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:49:00 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) [ 1785.761978] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' [ 1785.778179] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 13:49:00 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x0) [ 1785.845542] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 13:49:01 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(0x0, 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) [ 1785.860606] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:49:01 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x520) [ 1785.897015] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:49:14 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(0x0, 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:49:14 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x541) 13:49:14 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x0) [ 1799.628029] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 1799.637427] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:49:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) mount(&(0x7f0000000240)=@filename='mnt/encrypted_dir\x00', &(0x7f00000002c0)='mnt/encrypted_dir\x00', &(0x7f0000000380)='securityfs\x00', 0x1184041, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:49:14 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4fd) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:49:14 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4b5) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:49:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x200}, 0x0, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:49:14 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:49:14 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:49:14 executing program 6: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4fb) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:49:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e635b72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000240)='mnt/encrypted_dir\x00', 0x8) chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:49:14 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) [ 1799.782205] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:49:14 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x543) 13:49:15 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@random={'osx.', '^[-].\x00'}, &(0x7f00000000c0)=""/76, 0x4c) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) fchownat(r0, &(0x7f0000000140)='./file0\x00', r1, 0xee00, 0x1000) chdir(&(0x7f0000000300)='./file2\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r2, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x3) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:49:15 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4b7) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:49:15 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x51e) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:49:15 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(0x0, 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:49:15 executing program 6: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4b5) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:49:15 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r1, 0x0) r2 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000500), 0x88c00, 0x0) sendfile(r1, r2, &(0x7f0000000400)=0x100, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000380), 0x2}, 0xa210, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x3) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f00000002c0)='./file2\x00', 0x3e5) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x82200, 0x4) readv(r3, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x3e) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1799.938592] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:49:15 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x564) 13:49:15 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r0, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) move_mount(r0, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file2\x00', 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r1, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@broadcast, @multicast2, 0x0, 0x3, [@broadcast, @loopback, @remote]}, 0x1c) r2 = getpgid(0x0) sched_getaffinity(r2, 0x8, &(0x7f0000000080)) r3 = syz_open_procfs(r2, &(0x7f0000000040)='net/igmp6\x00') readv(r3, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:49:15 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(0x0, 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:49:15 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) [ 1800.035083] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:49:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) r1 = creat(&(0x7f0000000500)='./file2\x00', 0x91) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x1, 0x3, 0x7, 0x0, 0x6, 0x100c, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x6, @perf_bp={&(0x7f00000002c0), 0xe}, 0x8020, 0x3, 0x80, 0x0, 0x200, 0x40, 0x6702, 0x0, 0x7f, 0x0, 0x2}, r0, 0x4, r1, 0xc) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="300024d987055655368c7830306532342c74666d6500002100"/37]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') fspick(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r2, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:49:29 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) fstatfs(r0, &(0x7f0000000080)=""/221) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:49:29 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4d8) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:49:29 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x566) 13:49:29 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x520) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:49:29 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(0x0, 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:49:29 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@random={'osx.', '^[-].\x00'}, &(0x7f00000000c0)=""/76, 0x4c) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) fchownat(r0, &(0x7f0000000140)='./file0\x00', r1, 0xee00, 0x1000) chdir(&(0x7f0000000300)='./file2\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r2, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x3) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:49:29 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) [ 1814.007345] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1814.013014] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:49:29 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:49:29 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e635b72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000240)='mnt/encrypted_dir\x00', 0x8) chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:49:29 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000800)={0x0, 0x9, 0x0, 0x1}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 1814.140882] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:49:29 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4da) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:49:29 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x587) 13:49:42 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:49:42 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4fb) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:49:42 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@private}}, &(0x7f00000001c0)=0xe8) chown(&(0x7f0000000000)='mnt/encrypted_dir\x00', r2, 0xffffffffffffffff) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r3 = dup2(r1, r0) faccessat2(r3, &(0x7f0000000200)='mnt/encrypted_dir\x00', 0x2, 0x100) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r4, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:49:42 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, 0x0, 0x2) 13:49:42 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x541) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:49:42 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) 13:49:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000800)=ANY=[@ANYRES16=r0, @ANYRES16=r1, @ANYBLOB="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", @ANYRES32=r1, @ANYRESDEC=r2, @ANYRESDEC=r3]) chdir(&(0x7f0000000240)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r4, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./mnt\x00') 13:49:42 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x589) [ 1827.731232] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 1827.732333] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1827.758056] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1827.763039] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1827.766851] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 13:49:42 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, 0x0, &(0x7f0000000400)) [ 1827.790244] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' [ 1827.816662] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:49:43 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x543) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) [ 1827.905761] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1827.906491] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1827.907430] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1827.910470] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 13:49:43 executing program 6: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x541) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:49:43 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, 0x0, &(0x7f0000000400)) 13:49:43 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x5aa) 13:49:43 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, 0x0, 0x0) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:49:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:49:43 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4fd) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:49:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x9, 0x4, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext={0x0, 0x8}, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xc, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 1828.038494] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:49:43 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, 0x0, &(0x7f0000000400)) [ 1828.175285] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:49:43 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, 0x0, 0x0) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:49:43 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x5ac) 13:49:43 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') unlinkat(r0, &(0x7f0000000240)='./file2\x00', 0x0) chdir(&(0x7f0000000300)='./file2\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r2, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:49:59 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, 0x0, 0x0) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:49:59 executing program 2: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000240)={[0x8001]}, 0x8) ioctl$DVD_WRITE_STRUCT(r0, 0x5390, &(0x7f0000000800)=@type=0x2) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000180), 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:49:59 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x564) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:49:59 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={&(0x7f00000000c0), 0x6}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x201}, 0x0, 0x1, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000100)='./file2\x00', &(0x7f0000000080)='mnt/encrypted_dir\x00') rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8000, 0x2) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:49:59 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x51e) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:49:59 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, &(0x7f00000003c0), 0x0) 13:49:59 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:49:59 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x5cd) [ 1843.950624] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:49:59 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, @perf_config_ext={0x0, 0x100000}, 0x200, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x41b0e00e}, 0x0, 0xc, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:49:59 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000380)) sendmsg$nl_generic(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f0000001e00)={0x3540, 0x30, 0x100, 0x70bd2d, 0x25dfdbfb, {0x15}, [@nested={0x1ac, 0xd, 0x0, 0x1, [@generic="1d81dce206c70e10646b82af5caaac981ece1c8048cf516300b74792f81ee2ca1cf66607a895497bd4cb3b19396fa2a9269aca1d899a95158b0baab6399502a88832e4d2e1aee0a0055226cc1c6f8b0b6200dd868474f077dfb5ec3cf6e3c5abc5fdf40b33fd0013de4434ac5c253972175c085a1b5282753cf0c3d10b43f3545ee1ffcc896f6c7878a48562095a91be33751b7e67a1879bb44a3f138e33e10fa7109fe0", @generic="caa1de18bb5dbf6794750d2ae4cbec08ea904f046c26afbe53a4a0d046b49d4e663697fc39dd1ee4ea9a669e58b7b38f3f945e37389d98a0d301a2695dde1c714be4be65e9c774bebc369d4e4bad0df52f9594f9029228db1619066204e76bcc04b93377ef1bbe83eb6248d6ea07538a62abd5449d76a61a2abfd60d100a4660d7078020a74f224f6c5fad82dd0d24a61b5bfd722e3c37c815f83136841f979d7772a991bc97babb52fe4814b94bd644647b6ccf91b54ac455043108b4ab1351839d0d2f8cf09c8787bcab7dd662bbd764c8dce8f8a508e80b5e7dd01d4f52f06a63636c44", @generic="e43ac2d296ecaf7584d9f54c70f1055a59dd5b36a833614d742fdb3b296da6"]}, @generic="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", @typed={0x67, 0x0, 0x0, 0x0, @binary="b0adf3b13925655250f191ada7e9c35f73c8fae6288e484ed139e428efee667894317f2607c2ae43325faa723cc276af5a99a4847be4c9bd613ea66e08871d1342f5d4cd805b8abebf20f7cade4c0706709894d889db43d5a0d1b2365b460d6a42eae5"}, @generic="6c6075ecccefd1cf34b624a09734a8bbf3a16c4aa4769da22c106cfb7d1fa45c26d871c0a2eef634da1c9a57e78adb7631d8f88367591b9e4ea0f48a96cf87ecf58c437b28892f353befc0786c2ca00cb8a5ff0d60c373eb33f456dbfa59b74c8d051939b9ded1f0e7a9c980e12e4d1a8f409b56511911ec2ee5cca1a3f5413e09c62bf3c77fb3ba8f39590e2623674dd73863d414a87eab24da7e533bc031904a4891fc13a87b560816c660dcf384455487eabf733cfdacafa52ed51f6d02c8083ead0afc9723674c68e66443eeac08be5294162f1d7466b706b2a4534ba9fde9a236854bfeedf161bb30c2bb7172ad96501991c0022e626a489da24aa6cd7e383ac032b2474eb9331b682694fa7f5df3e57f4a08da5bd893188af6a60e420926ff7e34a41c0513c2f59b18de5fe5e06e29f98e8ca929e0ae2c1c554d40fcd1e2c59a1b07f3bd25314c125a9a63b80a4d1226181ad96bd24cd5cd4a546f342c0c9914f620e30cd7e49fb5f9e07012dbfa8c3b4cae9a528e33e4dd977eaef8bda85e98957f58bc657018881da2ee09443f82939d933cac741cc6161f2b8dcf1937a612aa9035a3ad902c1ee113e51890482b0395da0029b50b6a38cd9e0960f77c236b99252bcb9335a6753e837f77152471ea22c20fd53575ea5fa6ec2695b0cb63bb27a0993dede56b0565b77b6890af1ee7785bafaf9ae413f556280dc2633e44f703542076f75d51702bea987807626129ae992bdb80395a222ad5d72ddf08662142c1b834f57c17936ec0647081af94070551b85efbe78f76f6a39c1f06d7390845959219c27586b6f79923e0cd831820e0297135a80af02697a1c607256bc2fef208eca8a0887075657ffd2a27ce79e3b96cbe8539e7509b321984cc39b36c4cde3aa5cf2caacd3bc52159242995a1e2ffee9bf70a0664a31eed29dbffd183febc27c372e763dc3e824bcc9988bf37b4736e0321d7a1e707193acb32a6966264bd74abf1105fd4ea19fcec23ef381779bdb23618fa7802471933c5bd80dc5065b2a175c9646fcff985c954746de82f38d0cf1e4561c864be4125e90cb3d9411afb21d705b7b0ab74d149ac5317eb29036b3f52cc259c8b269098ed618046106b2646bd9327e920bf651982dfec329c7c505f351fecfb2fbce7b96a615923e61a52043fa9bfb6175232681649b656f1cac948c4f5840a1228009e66a11907444bd327782b69c37217ba922124fb0aeb0d07cc63c43bb813671c73c10650264dad88d572d1482f82697992ff643b62adfbd98763867d59c62389061e2a07ee2fbde9f3acc0285719be3d82a6342812f89c18959295bfbd312793f17ff9a621d32dd4567ada057657e1e78a4da72c32d1ae1357c63924f43d6b69c8f5a9cc4ed0adf9156e9c88130120e9083d09fd0370edf8ef4de9e62a85ee2512996dab14fadac80672cbd58ee745d2263e7a54dfdcd7f5fb4a8c1022e97912daaaa4cf3a57c229970be502cc12caaa100f0285f231332d351bf3081248c6ac8caf32ab50eec31dea9d2304570194736222fa11770b5e7502b4da8ed3ab6e7a3f2a7a88fa4ef41fe9bfbb52d67b3d1399166e047a31f2e4ff03f965c4e69dec92bf002c612b2dcec0015841524c822780e342b5e52e53ff41336db9d7a6780d16b1063c746bf3906ba125fb040fbdbcace6ebae1f0f10e75b2954ca197db060048acb9feb11eaa4053d321e2f3396a6901ca7c71f058c9a93dcb4c1561189fa6c56865a987fafe9b827f3e3f230028dc2ec1f3f6d30cf9b940d79a3ecb6200e13e43cdb81012c14bc61354dc269073af1ac222de2c86e48cc27496dbd96007f9e58e410b643994ba0ed5aece50d0376fffe99dce7b314745faf055e05132cfe6fcd90ded657e3d4a3ff7f62d80bce9000001c1bda88be923b2ffeec681643ba5d6ed6d35392067f4c076b8b3a477db727924265b1feb93471b6e557defc0cd600fa97b414e65739a1922ae386844cb66e72ac33c9de7c8d04dfed54710f333c92e23d669b0081573eeaf324d12ad8e12360675c2e3f343b556026300d2d0f5c224e00f2f26ae3375f8792183d303842822985d58af818b707ca79eb31964f0a68966dcd14cd8e620c6424e344c08b1bfad192e8089458374d3ea44caa15b908abecf40e6f2b1ac3485435d0bcabf4a2b4470d4fd31d19c1a75120f37feafcf9baea524300109dc5c3a72dc0c49e7e8acd458516e26556f112da124f295176cb6ba8cae8ac94ac2ae3fc38186026fd343b79cb934ec350d2228de5aae7c630e12a6eab3116b551c40507058dd3ade969f8d7c3b5b02b8702cad9188e74b35a5862cb627cbd7327513f57b9b169a8a71ce6028089e547138c54959a3c2b4c31d866a11dfc218cfb662a27e344550583965e8cf4b471f976830b1979c6d03fa4180c9de861ab225e1efb10b3fcac4b40a87291537b23e54fe23a59ed57feda1dca028356e701b8c6d8b9600ccc37b3bed0eeaa4b53fb67cccf95791dfc8abdcda1cd000d0654fb25c4d87339a95b68d266ef969a131d7f1276ec9d1f4f4e6c0cf92c7fe7f860bec11fffda6f502616908d1561b272498daa30a1776983d14e99eae153a01e96914f0f1805be047f2cde38b88ae738187c3041375d9f25cf8034111978544c947ad80c3358daa813ef01228d4c9b8ef984fd1eec4e75c223d42d87c2dce87af94a7627ef24c6fe9c78295956fca74a30d1e8870145b6bfc496a616ea76e056e0c81cb68bd4f77248fadc31d883bcf885e01f379629134c5b98bfe004346047467779c38b77a4b30d4df7cbab4e039a606557cfd4e06791f9b82241a3094568617b1ef174653c73dc4a918c3caeb61fc67e45cbb8a6b47ddb6bf050b22b10e6537dbe0bba889eef26629ef101345d3b4588367a25fea447d66bc4f5b4ef898d7e01b771fd7fb55c7f86af8e22b25572f07876c9e978c5a1e77620f823822fc640d7efb695c65bad445d6a93bb733ca8b2eec89d4dbd51681a38358a25ac985763333f79956d2d5bd1c422e85826c72869ae3c7f5d544b5a9210e8bc0de0909c9f9749c0c6190e3961a15ffacc47f3cadf503c89020173ef4f1244950121e453dfddfccc84395e16e5c2cbe290b50a2f1a309a3f44717ede3978db07a084b4d2add7a4243f9bb6e7fa4402b8b8c8e91073cd7a439da305196667a559960ecac00e88b697278e91d13aa0d4084323922ab0740873860fa268bf0d23f72d5aaad8acc2e56ff39beb0a825e014edda7e082e0c900ca25334f6e2ecb7aaa8fea96085ea3a6328ad8fb509317143686086bad72cee3f1cbead6b4369d50b111799a562ab7512f29f545fd55a6460fa36fd52b2e0da68530b3c3e56b11fe3793c97a90a3d7b3a1118767acd0ec9e2421c0c0b6d675a92b16b4bc7cc8debd4f68401e27e72bcd3b59cda57270229dfd1dbf53d92a49c8eb382f9de088fa8b414e6d658a5c2f5f548ec006f31c2e4bfd20e95afdd00f1e332a235f2d9619d3e45ae5019ea9f23cce971f1991ce3b9a69533c13ae57abf59173b45dd9bc28ccc594a042e35aeaf56a6863a2a29190c1fc553e58fa92f710b7dcdd4d5567e0b6be7f247a73f3cd2b93477e82ea629c3ffc7bea5230b8ccf97b9807e846a3423f06833def27fa5a8d8b41c9e65dbb259626f99284f76db6737b12f26af408b558b740cb70cc2990bf5857075eb2fec8298d60c89860d5708209d6dd72206945f7f93bb45629a8ed19600ecea2e9480903006cf004bf18da51d89fb5ce3e1895e15314ab4d3fb88de7a6aacc113c02776ce002bdb30fa05df4b6b41f6e8ce8911bc0804d8593b11a005db193dde13ef28e47b58a15187825ccac12df29202b51b870a9b940bd300f89b4a0587f30f2b9022c0a220d6b4ce6729a23e379aba2b6f7a849e3d9b246a06bbbab81eebe7a1b23980c886b21339673f86bdc52f1b4d526c21d399137d88ec394f03af3331833c24673895394a48d0c6f05c55cbb633da3df802fbdff075cf139164eeee28ba6faf7ce6d4e62f5749e2a2f47e34dc5617e2d34c353937f244d9a0aa3c3a494ddbd9cdbd3f6204031034667f96f1ec021bf57e70aa04522badf75a5c1e8f57f6b93d4a11c3636f3a8b73e935d3dd0b4c3b492eb02f96363bf0cdbb19a0561552ccc685b7f58bf0d9b7fb291818047d953297e599c14dec6f28c1dacf91dc3322fa1bf305678b4a1579f3010747948f33c2921102f1ab8ef2bc6dd347a8cfa0dca75da316a6f1733d93aa0695dd4480eb0096a6d294af4961a21cb67c855e9ce3fb415679dbd04fc0e8ca4eb496276b9065d71067212c75192eb01b872cf6f1f00d246ac78366147f6c2edb850688a4deb171d2b7527fd86e05ca48f1e572bf7fea6f71c94de14aafdee64ed7428aa0b576b8f981050a94cebde068dd1e974de865dd46b8cbee58a8fdb297758f92b854b9b3dc05546e9ed6cc54bc4eae4d2baff1d3a41393b58111c35787c8d088b37be711712904330918034f9087abbf8f64be9ad246ffa6719d73b1ecd1b8e0e16aee30c34cc4b8150cdf4d6baef347f0f02e08946f2fde94e49fc62fb1f1986082929dc73868021a1bab8aeffb35ec152f63d961215ef33934004669302b8a48fef1d8a857ea928a51b80e56c7a99d6bf7b900c272038eb528ad0d5ebd6543d7aea003562ed316e1efc6c3d38c82aa068474e12fb1b8b8bed1d3ffee0e292fbc0d8717c00ed366771d0ab634637805a434f18223f39e174e3f97b7f8708caf9e1eea6f0dbf54724b416b999e6dc33a3c62ef078170332833fbfe34ae3e0c29e4a04497b0efcc497734e23cc646b8b115e47910fc614e9ea77fadcca1121a547105ede9e6afe3942b503564cc76b70933131b5408460f238a52faa6441ebc8805a75781d717803798b667245c191c023ebd44abfe02aec8cb354145cd0290df4a0cf5ac894e63820a32ebfa124e31499f29cfecaf8aabc73ca58f94c0b3c831385068828990c7953f39f1cb50098640ed05c577909dd3eb7c424ce1267ecc17329e9f9eaa83bfeffdddfa87dcf0999876c1ba9308bdaa1d2c6be2d7db2b1111edd92695f4216d47ab7b3fb73786ddca0c536b2a2e770046a40ac7014c01a7f8f0b4db9854b892e778e05c5e247dcf2983995030d8d98f9433340baa4e24953eca9249ff6eb2acb84162bc09cbcb34fe29e1d4bf5f3455e0b8d353cdb1cccf5d8fd7664bd85ee1170cbd49e6be8694c9d46b655fa334812e440a36744c1ef167bea9cc14e51d5093e24843637352b5fa706b749e3aa305d8d086790e99dbbbd456e87110b142714daf9789fd846b5fbc8f3be0a9b02cf3e4a3dd9a63b2f2c6e4c5764b4105a3cdb4ef4fe5201c6c735795e6eb4ad989374932a2ebde9d18fa77bbcb4688b45555f8e84b8fb88029b6bd1760a723fdda6244d48da41a39ce990a2b096f81cb60bfc428d7e6c2d30117363141b297b74314a67bbbb198e7631116c90e3c037209098a985c191dd8e59f03f0a9c59e1a5847480025fdab0b99c1a6d8339ca66fbbe0717409f7ef26d0de9bc34f7369b1176b5b8a2552aa17e4fae0fba0f994be22aacd0dc399982139d2739281598a4f76662f56947532673b2622e8beca731f07a6dc7fbf93c4d20f492dda9db15d851845849fd07ce1918f8c9aaac503358e06ec7d1db2c34f45528cc1b8c0096d81ffe128cd5d542b1faecfd0b27d25d749a3c12f34d93256da7a0c0a07e0da438714c75807d9e6293ec8f478feed78c25259b0c00", @nested={0x79, 0x65, 0x0, 0x1, [@typed={0x8, 0x44, 0x0, 0x0, @uid}, @generic="ad240b24fed719ba8d4cd84cd3eec27fde357ae159df188bc681a2bc371b00f9b1c3fb2fa9047ad79189ce10e65e48dfe701f0b988bb811f63977e9e3577af4319ae3b2bb92ae6068f5aa8af11bb56de1946c7c250b30f05c70781035ebc874293b4f17aeb", @typed={0x8, 0x70, 0x0, 0x0, @fd=r0}]}, @generic="a7d054ae2777da5d5653e5f06e6dec323b10b5c63848e53d4e0f0488df622c17c84535f4d1dda03bd05d456f2fb9723860274e5d3cd73d5a076a76861dc2bc2af044a20b308b5130fd9f2fef85748d69af9443da3f1c2f1ccf4ee7225d0c6dda1a6a3009ce563ca7a9deab39058ff8bdb5dce3ea70935a47ae57213b0cdeb29e0be545d421b982bb951a234e2760fafc58fc2463fd0473ee9644520d3f55199b", @generic="c45c19e5b5c20bb4be43ae9b9542b3040397c069110bc1c36f8395cb6481ec3937d0e31c9144e35af932a0352398be5c09b72b95135e34fefcb787ddc52c28fa3bab7ca3547183", @typed={0xc, 0x12, 0x0, 0x0, @u64=0x80000001}, @typed={0x4, 0x23}, @nested={0x11a3, 0x4f, 0x0, 0x1, [@generic="72b56c1031ef53857ef0bbf2053f7b41008797edb8cbf804f259191c9392cfcc01ab5cb22e3cc152d383d67903db79ebd4e98e8e6c918706c837ca44cb63b90a4fac7d4066790afe9706693436f37cc2a480f1e0d567c1ebba142dd767bb324b64f754aac0c9f222cf2218d8ef3c8959d52ef82d47a19afa7caa6fcd2f9689eef67e0c99a17acc61cb778788aa1474a36d4d29fb1be52a00b54df2fa457814e5a188650b300a24b338f1a2e2c5a4839b3c6188a22ea59609e685732f5e0c52e0a0359928b956f49f87015c03844c38e57e8b10c0db90b8d103678fa754d9d12b9492622b20631720abb07f8d53ed507e1022e663e50b20d89d1974db9e54c99d580847be6ab44d55a9ddb0257ccd43a91e61ea21a10ab54f65edca122a6b098b5122d633095bb8381a1e52d24ae2ce222bcb4a679c3738df27d62bdd7b37ca868bb448db8ccae16562bea0fb43a124e21b9bc041d9da0c93c8ffcbeac464a9ce7802e1a8e5971ce4cc878ffe362dd25729f39f370a75b4d0ebf9b6ff74e4358e71f9c608e7d9d2b172aaa10216b055a2c7000872b90b21be8c882e01de72847ae4d7ba854a378f1a3c47355eca0302725db29ac623e76d3a2708a0d7e2f269c922aaec3611b088b08c450ffdd2a9786397e436951cee36b3650a2ef18d43f22c193a5374ee95070fda87fc6eef1836eb1049546edfdfa6c5bb40f33392578410e8222da727558eb5a4019b6115d625adbae94d2a1863e7ee8bcc756e8285846e3e32c01f209ec23c2d2b1af20d6516862ea6945aba6b6df3aab3ceddd1eff3e11fc08ebc8465ff31a061f1b54e7569f18f1e3a7c899356d02267f98af28adb979787acf1302d5f8b8383f2d12a40a5aa560fef9974dd9c0e3ee6a3229006f9d30385a5ce73cbc88753c273badaeecf0a77ff8732996fe09be93cef6d66cfbaa44e44406fecc409b9c5f5bc64f45b3528fad6b790ed0b23492e6a1e9d1afc4f676ab25c5a90160a3c5c3fe090146c4c3ef71ad734d8acab055afb123f945b976ee2a47dd80fe850012bec92d90502e6607942356f5a1896bd5dcc8242e703fed873765485780392dfb75e22b9d816f3c07270c55b4cbd5f743a1730fa6d67b7c6e2541206810d026ff0e7d0fabbba6a02f94ff39cafd96fc5a4bdd36eccde90ab1991d1b5bdd28b18a42a4122ca216e0403052474c7a43d9c4a153c900a1713c1fad7dca431d7e8ffaed28d75573534faf981a94dfce67cc5794d961c3c33cbf7cd2d43f9f52d16b62c91b8ed045e28259e4eec4206ababef5e7e9feef1a5745bbec0db14fc7bd4425a8938330f8bb1d63f0f851a4af958d1b890e081c99e2aad2bdc7f9d2709f0efd1be6855caed54785a0ae966d044e6f636123e557449fabe37be23bf0daa5e1daffcfe29efe9fe5f6eeb1737e330a6dc8a59ed714b8a7dcb3834c77fa6e932d204922b4c46ea765b8a0e3c786de53db9e8583604ab41df156a5ea7d60cd46debba491503a3e5cb4faa18e92ef5b8c067791ed85d3dade7843c4dc3e132b7e8494da02bc28603caa1f46e00b09464974659975ed37a4e32572731ac4bc95659e19de67651662fc5cdab4702f50819c573cc23410ffadba3732cb9a1caebbe23aaf09340a38253bafa9e6287fd646220c169fb6e8adcf84048e52c0a71a805dc4b504f34ed645b960479f93d65a7534cf6aa53142abeeb22495dec01b647aa84db55ab610bc16e4881bc1b76f37ac3182fd574e0f85bc3c058fe00d95c3298cc3ab8a9cc1943445372bdbff1bd2eed46475a9e6964f8aa8d4da3af5b04fbede96bd247bee2cd80b378a2f0c4b58bc933613c232f46499551e10ee669cd8e77229af9c9e84a70f880d73042927f83b8d9c8e7cd89a95f3b54aef427f1f81745baec540cf8de60240d60c672bc1efac8744516d0e313c585db3e1748f378b327434fa57b5037e96d0fa5c8ec8cf90928cb93f9cee0e3b91df5a821be4e83020a88b55a9c1dfcca65de9dc21f5650a35b84c867c3020c8212fed38b6f1744cff07bc5ecaa1e39ab4bfd434d0aa1d215e6a127608ddf3e05781d90db569e6e3c8f53fac937c96b60f2e51bcb073afe9dc46ffe29ebc89e3f8d6616ae00146b21917945c08e61e55784e95fa6eb43df08dd872ab95898bebeb79f123299d3ed38022fa0d192d278efaa80cd5d29caa5fe53bfa2fcb3c88781f82ede54218decbf7cb9041fa478fa339e0eacebf74d3911756d58ad371e5d936bb6b8955302a02ae1d689c4e5f678925d9ac3990b5fd429bd224445417e4369def046958ef263072d9a79d8411d29fd3ce0654c54c0605df1e12ba7db80fc79c88279036fc299cd771485dd0ed184c9856da0c10bec433bc37202d433fa5baab1e91beb860188088ca5d1689386890f4db3f3418c20aca96737d45c4a7e9887dea22474fa566a296fc83f0ed6de466ecb46c9d8dd4ba6870202201e0b46c447046511d56cd126bcc06e60916a8f4af2f987047835fd79ce4252e3402f183ede97cccf8cb15cebe5e528d87aee45fc1a55bb190b6ffe7b4184f9d9f3e5bd906312f3deb95ee01150822f144e5ebe8af6c979eaf9cb1508b0d7ab8f78009dd4bef3f60dadc4547fd2deb02602795061a1e7dd74788610308d712930282e49ee2320aa3e73f5105bc21329f48b04244bc41c5692365a437e2c3a8ed69c088866bf4f1dee4cb6214fd8808bdaf48f26f1f4fa9fb3bc96ef4651a73ffb5366b830bf1e3361c8b2030388f6afc60ecc115b7fb812b08ea7a4fb507cd1bba14ca64b0eea8bcb3b3404d4d3ecb7dc50ad82680596836a1001f35f93f403c10deeba98646473688726614eb010b75dbc3c07112926a227312bbc74814088d6249477125df1cc13748f7acd6949073e8e5e68c489dcda1ad92d8472d1860c88655a2c4b7537e5976faade3a0a947ec211bd511d82482ebee5f35c7dd6bf81590016fdfd175ce027ea0e3736992a1c6c1ed9e6f458a7539df8f0a45d5c59086a7e9a380f1940fa0f0d4c744833bd11fac2faa63899a4ee07673d9b0eae81b626a7548ba544f2faabb3c34602fae63fae7b1502bb05cdfb08e699f033c446d9381213ecb95cabb23506be361a27273104e049df4b8e59e1cd6d27862dc1aa3af5088d107a396ffea73e800aac29eaf5aafdbe75a388ef50d81ffb9562c6b5185eb8d0a9fb31881086dad39ac1d6a77ae1d0df72831dd104347374699d1223128c90b797b2c213418dad33b3c5002612f169aa1d875f10e40e9f943c2335a01e63890cf7efa22b004f142f97ade29ac51a5f44a09b16bb00be75bb50663c0db49ccd58819821e75a032bb619193e452012c39060eff69f60585de8870578ec0d5d9b3717c48b2576df4e55dc894285328258c4965264d459067f0cc7b5cd2c9605e07f8a0a4b8c83a766484eeb91de96048465de816fbdddf476c8ccf7daa675b7af18e9c1affbdba8cd3b18c211756cdbb263748da13a1f2bbb17efc38b505759322938036b399754c27d824940eb9fc6f92cd9d4979001350182fe37e6b8c192b3852534f3a5dd9c8e414a6ee2518f0deedec29ef6d03ccd1dc919eb6915a2cd48881032a15033cde67777f193c1e92158a213176ad4c4cf35522f0441d2e2b43e0ff62b72eadc1f43a4691010ec7d6e100b74fd8626961150088e2ba2e55bd30919dc0500892388e4d6090176f46b71d9d569abbec40f8c2fe82b9b59c71b44a63aa2bee0c3b3d4e8d8b6f14f7f2b9bbc03fba1a0663f4f0cd2c8ad104e0e97dc850f0b8a4a6cc8b05e46d24a4ceea8c2319d0c53794b689bc3c525ab1237971a8163f6de4fe5c802aefe6521f6139491950d42680299d3997298751b1adfeb75eb728ece9b4a2c77306022809d4b1a54d962d1a85940ff915d8c31caf611461a85d11dc6923bb5f84885f91e26663ca7b6412a02eeaec4367e750fb4bb8aa120da981e49a806428c53e441139a1a831727d49e8b831ea0f46da4399ccdb7f1ae681d4d86697c035040fe58ee377de073b3b37e1ac2c2fb1bd8062fc5294a353eba07a58696ac70e4ebc965d31cc62cb37c9dfad604be96fc4d731b248880fb2970872cbf0051bdc0e3ad2cc26cb985eec4c102cfc5d1536924fbec926de2b5a8b3f39ecda1b6547fa480aa48d6696ddc7d2026c78b08e18300c483e0fee9bc0043c9bff4ae7d771fb5dc046bcb25fa277b715a963ea742b18ab377522f54aecba95a9968dee1e72975fbdafa4d9d37af0c3ed66328a1c9393fe52d4e17a22b99dee4ad5e2b01a747e0481d1061fa96acf90740daa486b27dc43f5fa094dd16559177f026dd977bff4f40878521963d059568395968d4c25a7b176f916af44dac4f2b3fd723d7e01e77b7e5243b94b11e873db4dd889e7e864f78e510afc9306598e8a723f85f513d6647e981543638130058fd76c264ca3afed7327a75ea0eb5c3ae3f4b09d2a50e743f07dd0eaad99e3c87f20083d0870fefe7eefea420f795e4ef33edabe415f7d3340bd80fdbf3c11db079c463b2075c0dcf2290a3aa7287b88220b0ea13ecb88d023b784b70c29269ef8883043bac5f4b5036cb860fcc34ca39521d4913901b677c03f67dca10b2c74afb00a82eedbaf2230c2808e579bcbf17c821cff052287f112f793dbf655c37eb3726a9949d6a0d06f33047f815180fefe58fbf6c89607c2a6056b3286fac62d4dff3bfb131ed97c45ca1640d0c29772337d5a3954bf2ba9d980cdc8548260f20d3991823693daaa981db3682ae37efa40346183e97c60b48960b77ec70e6a7c3eb95d1bd95cfb275fba50cf65713ac1fa2a67c05f01e1e3feacd95f90136896239c269aac613b2addbd495005842bb890e5b7d8620c70d48d6257b8493aa49630af5b0a700eefe03f93423451aadc8c3361071d497f22673a23e56d05def25b359256e8110392ba927c4f94799321995ae88d4c1fb900c7712a2840cfe90f6cc0817ef9c7db416540e70d93273c3a665179cb6fcad923a9c6be29276c1f7dde5df5329b07453ec03f22e62f9c0a826f6e0e5a320b453461271bf554220918969862437021d1413f47c8faa62f31806fb3cbdd4a7dba6e971bfaa3e9cbc18674e865f776dce8ad8e7ecb0af071f260abd7efe9bc06b4986c8b9e3d6cd2ea83e307fa8cdcabb5c066be82be98d41025d97eac92d4dbce41039fa1d3c4afbed7ce6780a7a3e5f6b358ed155c1e2a65061c93a5d9a49c83eca98d21769461ee07f706697fafb0c6f40f25985eeabea2c93f087035401e46635e7844e6b5c591b06c639f9743b0e95ca58ee18296585209d64fe63f7148f84783286356ed2e5d5ba0c9631585cd1eb78fb75b7c37ca1e38029bab4fb059450e8222c1e4ccdf4907420297b4fbe58bb615c2c0f8c05fe7a79fe96c96715680255287c3e9e248b2998ae79e4215080ffa47cddf7cf2277ebcbdb87d038c71d859017eafa5aba14ba6302fbe4ebc262cdc9f59ac890b8597c302f6f5650c9954e9c086129701464561242e32892382a784f7af801dcece63e9824bf3f14572a388667c29c535839a3d63c8ba97b5e3b54a86ddb5f2a48737311b3bc1ca0c6311909ce9badda0908b57034635280038772e84c740999177d0e8583b77fd591c218b8d7fed0715f9292ef7e8659c0e9d197db318d9145c370053aa86db6fe65592dd5b52683112a9c0f83d727670dbe27423254071b35c715a15fc86814b87924de344e21f13c5626ea468a1e6a5bfbf39254e2575063667bbc53ab309b4fe6b1", @typed={0x7, 0x2a, 0x0, 0x0, @str='\'\'\x00'}, @typed={0xaa, 0x83, 0x0, 0x0, @binary="1ce18c76b71f6203ceb26db8d3f2776cb57b34d99f88c42dce7ebb207b9eb2e198549c6a34d82d3e51b036620f839806c51c82528e36c32330bd8b4cf2288749468c718ac0394e43fd7d6fa81e48f742316b3e2c03f66cfe4771409f13fa6051560525c668171afbe761dac1981233896f510901f57e4ab5f9301372ef33fe12eb4d0d3aa12f4ad7c7bfbc3e042b844991edc884a002e75eb361ef29d947b3a67dcee1d1d64f"}, @generic="b3b3e7f55dd08fbba60ae765b87bfdd8bd34c2b1d5fdf1da056b706254a79411c65f620fc5e864d18dd30f9d2782badace8e736b3f612879d831c2adbc8281838da4a5d65d7c7bd71c1dc4e9650a92882c351b18dafdc8c732b15b486b0d11b2567890aa77085988ec6ee2dea5b132967287ee7c0106645706bed491215ef2db4af6ed703a54b6f9964464323ccc2934f8d9ebae6fc772aacecdd5e8af5a553ac5d749d8c94630ee68b80970bae8484b2fee80be60b7fc5517fe51271302d5429bf8e522b324ce1a6130a7d35563910a30ee62fd1ebdee11621fee5e1a4f42555617c5373d649d8733a20c"]}]}, 0x3540}, 0x1, 0x0, 0x0, 0x20000000}, 0x24044080) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xf31, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="e04c40000000000000000010a700"]}, 0x24}}, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x1010, r1, 0x5c1b0000) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x410, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000240), 0x0, &(0x7f0000000200), 0x4010444, &(0x7f0000000340)=ANY=[]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') open(&(0x7f0000000280)='mnt/encrypted_dir\x00', 0x200, 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r2, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000300)='./mnt/file0\x00', 0x20) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') quotactl(0x1ddb, &(0x7f00000002c0)='./file1\x00', 0xee01, &(0x7f0000000800)="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") 13:49:59 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) [ 1844.085331] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1844.140762] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1857.932967] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 1857.990211] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:50:13 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, &(0x7f00000003c0), 0x0) 13:50:13 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:50:13 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f00000008c0)={0x2, 0x0, @private}, &(0x7f0000000900)=0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000940)) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) r2 = getegid() lstat(&(0x7f0000000000)='./file1\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000100)=[r3, r2, r2]) r4 = getuid() mount$9p_fd(0x0, &(0x7f0000000b40)='./file2\x00', &(0x7f0000000b80), 0x10000, &(0x7f0000000bc0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@cachetag={'cachetag', 0x3d, '@]'}}, {@cache_none}], [{@smackfsdef={'smackfsdef', 0x3d, '{*-(*%$'}}, {@euid_gt={'euid>', r4}}]}}) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') pivot_root(&(0x7f0000000600)='./file2\x00', &(0x7f0000000780)='./file1\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r5, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000002c0)=ANY=[@ANYBLOB="f1ffffffffffffffff649fad", @ANYRES32=r5, @ANYBLOB="02000000000000002e2f66696c653100"]) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000080)=""/243, 0xf3}, {&(0x7f0000000000)=""/19, 0x13}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/33, 0x21}, {&(0x7f0000000240)=""/50, 0x32}, {&(0x7f0000000340)=""/214, 0xd6}, {&(0x7f0000000500)=""/119, 0x77}, {&(0x7f0000000580)=""/125, 0x7d}, {&(0x7f00000006c0)=""/150, 0x96}], 0x9, 0x3, 0x2) 13:50:13 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x5cf) 13:50:13 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) 13:50:13 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x520) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:50:13 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x566) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:50:13 executing program 2: getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000240)=0x6, &(0x7f00000002c0)=0x4) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e6661740002080100a9d046b8370aad", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000380)=ANY=[@ANYRES32]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x202002, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307836306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) r1 = creat(&(0x7f00000003c0)='./file2\x00', 0x81) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='statm\x00') ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r1, 0xf505, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='mnt/encrypted_dir\x00') 13:50:13 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x2) 13:50:13 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, &(0x7f00000003c0), 0x0) 13:50:13 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x18102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 1858.150056] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:50:13 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x5f0) 13:50:13 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) [ 1858.180171] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:50:13 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x587) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:50:13 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x541) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:50:13 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f00000008c0)={0x2, 0x0, @private}, &(0x7f0000000900)=0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000940)) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) r2 = getegid() lstat(&(0x7f0000000000)='./file1\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000100)=[r3, r2, r2]) r4 = getuid() mount$9p_fd(0x0, &(0x7f0000000b40)='./file2\x00', &(0x7f0000000b80), 0x10000, &(0x7f0000000bc0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@cachetag={'cachetag', 0x3d, '@]'}}, {@cache_none}], [{@smackfsdef={'smackfsdef', 0x3d, '{*-(*%$'}}, {@euid_gt={'euid>', r4}}]}}) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') pivot_root(&(0x7f0000000600)='./file2\x00', &(0x7f0000000780)='./file1\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r5, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000002c0)=ANY=[@ANYBLOB="f1ffffffffffffffff649fad", @ANYRES32=r5, @ANYBLOB="02000000000000002e2f66696c653100"]) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000080)=""/243, 0xf3}, {&(0x7f0000000000)=""/19, 0x13}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/33, 0x21}, {&(0x7f0000000240)=""/50, 0x32}, {&(0x7f0000000340)=""/214, 0xd6}, {&(0x7f0000000500)=""/119, 0x77}, {&(0x7f0000000580)=""/125, 0x7d}, {&(0x7f00000006c0)=""/150, 0x96}], 0x9, 0x3, 0x2) 13:50:13 executing program 5: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x63) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:50:13 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000080, 0x0, @perf_bp={&(0x7f00000002c0)}, 0x0, 0x6e513ed1, 0x0, 0x8, 0x0, 0x1, 0x200}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) setxattr$security_ima(&(0x7f0000000380)='mnt/encrypted_dir\x00', &(0x7f00000003c0), &(0x7f0000000400)=@sha1={0x1, "6005b0ceb62a79d0a3d2a07c9e758329049057c9"}, 0x15, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) chdir(&(0x7f0000000500)='./mnt\x00') rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) creat(&(0x7f0000000240)='mnt/encrypted_dir\x00', 0x90) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000540), 0x668a00, 0x0) futimesat(r1, &(0x7f0000000580)='./file0\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) fallocate(r2, 0x9, 0x8, 0x2) 13:50:13 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x589) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) [ 1858.434956] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1858.463261] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 13:50:27 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:50:27 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x5aa) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:50:27 executing program 5: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x5f0) 13:50:27 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x5f2) 13:50:27 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r2 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r2}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r3) connect$unix(r3, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(0xffffffffffffffff, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:50:27 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f00000008c0)={0x2, 0x0, @private}, &(0x7f0000000900)=0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000940)) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) r2 = getegid() lstat(&(0x7f0000000000)='./file1\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000100)=[r3, r2, r2]) r4 = getuid() mount$9p_fd(0x0, &(0x7f0000000b40)='./file2\x00', &(0x7f0000000b80), 0x10000, &(0x7f0000000bc0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@cachetag={'cachetag', 0x3d, '@]'}}, {@cache_none}], [{@smackfsdef={'smackfsdef', 0x3d, '{*-(*%$'}}, {@euid_gt={'euid>', r4}}]}}) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') pivot_root(&(0x7f0000000600)='./file2\x00', &(0x7f0000000780)='./file1\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r5, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000002c0)=ANY=[@ANYBLOB="f1ffffffffffffffff649fad", @ANYRES32=r5, @ANYBLOB="02000000000000002e2f66696c653100"]) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000080)=""/243, 0xf3}, {&(0x7f0000000000)=""/19, 0x13}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/33, 0x21}, {&(0x7f0000000240)=""/50, 0x32}, {&(0x7f0000000340)=""/214, 0xd6}, {&(0x7f0000000500)=""/119, 0x77}, {&(0x7f0000000580)=""/125, 0x7d}, {&(0x7f00000006c0)=""/150, 0x96}], 0x9, 0x3, 0x2) 13:50:27 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) openat(r0, &(0x7f00000002c0)='./file2\x00', 0x104000, 0x100) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv2(r0, &(0x7f00000006c0)=[{&(0x7f0000000380)=""/144, 0x90}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000000740)=""/101, 0x65}, {&(0x7f0000000580)=""/154, 0x9a}, {&(0x7f0000000240)=""/64, 0x40}], 0x5, 0x1, 0x8f, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:50:27 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x543) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:50:27 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:50:27 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:50:27 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x613) 13:50:27 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r0, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) connect$unix(r0, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e21}, 0x6e) chdir(&(0x7f0000000300)='./file2\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:50:27 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) mknodat$null(r0, &(0x7f0000000240)='./mnt\x00', 0x1000, 0x103) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1872.269810] tmpfs: Unknown parameter 'ÿÿÿÿÿÿ18446744073709551615' 13:50:27 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) openat(r0, &(0x7f00000002c0)='./file2\x00', 0x104000, 0x100) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv2(r0, &(0x7f00000006c0)=[{&(0x7f0000000380)=""/144, 0x90}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000000740)=""/101, 0x65}, {&(0x7f0000000580)=""/154, 0x9a}, {&(0x7f0000000240)=""/64, 0x40}], 0x5, 0x1, 0x8f, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1872.353432] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:50:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) r1 = accept$unix(r0, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) preadv(r1, &(0x7f0000000400)=[{&(0x7f0000000580)=""/167, 0xa7}, {&(0x7f0000000340)=""/164, 0xa4}, {&(0x7f00000001c0)=""/136, 0x88}, {&(0x7f0000000500)=""/127, 0x7f}], 0x4, 0x10001, 0xa7) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:50:42 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x564) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:50:42 executing program 5: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:50:42 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x615) 13:50:42 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r2 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r2}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r3) connect$unix(r3, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(0xffffffffffffffff, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:50:42 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x5ac) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:50:42 executing program 6: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:50:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/98, 0x62}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:50:42 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x566) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:50:42 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x5cd) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:50:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) setxattr$system_posix_acl(&(0x7f0000000240)='./mnt\x00', &(0x7f00000002c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x2}, [{0x2, 0x4, r1}, {0x2, 0x4, 0xffffffffffffffff}], {0x4, 0x4}, [{0x8, 0x1}]}, 0x3c, 0x2) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r2, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r2, 0x0) openat(r2, &(0x7f0000000500)='./file0\x00', 0x0, 0xf3) 13:50:42 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x636) 13:50:42 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r2 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r2}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r3) connect$unix(r3, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(0xffffffffffffffff, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:50:42 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x2) 13:50:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x9) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:50:42 executing program 5: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) [ 1887.454566] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:50:42 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x638) 13:50:57 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x5cf) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:50:57 executing program 5: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:50:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x801039, &(0x7f0000000140)=ANY=[@ANYRESDEC]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) open$dir(&(0x7f0000000240)='./file2\x00', 0x0, 0x15b) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:50:57 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x659) 13:50:57 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x0, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:50:57 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x587) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:50:57 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/38, 0x26) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x4e8d0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) 13:50:57 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') mount$9p_xen(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x40412, &(0x7f0000000100)={'trans=xen,', {[{@privport}, {@uname={'uname', 0x3d, '9p\x00'}}, {@privport}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl}], [{@hash}, {@subj_user={'subj_user', 0x3d, '{%'}}, {@dont_measure}]}}) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 13:50:57 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x589) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:50:57 executing program 6: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x5cd) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:50:57 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:50:57 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x0, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:50:57 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x3, 0x8, &(0x7f0000001880)=[{&(0x7f00000000c0)="f4a23a65b54d7fa886c586e0a75648720b9dc88baaa8c8418dc2bf20284ef7ad31aab4bad3ad502e81ea312e7bf8574dca23d40a582f1c39bd8b048b8d451cd011e26dbe9bb7614ca2fd163c274f2b5dc97e8faa29189e47c3ecb6487c61d5a7109e1dada1ca30e2159d6439f2810a0c4a715fe80a6d1863c08748ef1c8d9336e889b67340160fb2671a7083", 0x8c, 0x6}, {&(0x7f0000000800)="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", 0x1000}, {&(0x7f00000001c0)="74efae3e2eafab2b37b937fad991230490ec2aff1d3fdc798fa14763938ea2a9dbaace898c2ac1d4eec6853374a7a25f3c2bb70b700ed167713ffc64f715d656a29e808cd5cae8f6e4fc10f871ce931005d1982e954cbba6cddc14ab2ea699c56e2a936b0a677266b2841175e6c82787145795d6c54c61b5530fa6465d213f632fe5eae279fdec69e1d30e0f2583484ccee3f72b4ef03b5981dd781a9a4668cd95bb42c6fbec9d569f19106ea83440b8905fa60bd425", 0xb6, 0x400}, {&(0x7f00000002c0)="e4de13582e76f6a674ed5e90529aa9b8fbf4c3db38ce", 0x16, 0x200}, {&(0x7f0000000340)="d3dfadf314abcc547bc21c80089a83ea38b97b9d43f109d9283b57f424614f67c2ab39e7f9647405e63b422df2b0dd2d20de6d99786ba5eec6b5965cf40e3b3bb3e5c9fce72ffab28de0abc61446cea7dcc9bdebb8b1de1d9e855c53da5c67134aaf1e3ab6927f86167d2f54c881b9e4a73bd37ed9e69d52507a7de073e7c9a1beab266525f345af3cc8c52241479a1b03184501b08142dbbe9ee535627a1823335d069ee1b46a734cf01330658819c5510d73e1ac510a56085f97c504e88e9ebba2d75868ca35d3dc7522db7450fa5b94dfec8219fab385cac9d602cd66e6c7f3354f", 0xe3, 0x3a00}, {&(0x7f0000000500)="e513dd3fd99d9e952e9f33fc39ee6950fa8739fa0dd5afa468ead95e97c8a7d98e9ad2e6c304608b5b59cdf3c161b64ed589883060eaf9aaee4617355e3795470556fedf475b2345d231593b3da56c98371cec90ede52fe019486ab4f550b38d5e250f5bbbe79fbee99d41515aa1624af96161734dffb5fb620c2314c299c178cefcc00037abc9ea47d5c156922312ce09069a1b2a82bc0795497e8834b4da4d78eda64f97516543322228cb690c85d5d63cc5dec2138a3dab03b0ac656a68d721bb826f88bda951c23bdbbd300f945d9ef01bf4acf46d821cf24ded5ba7bd76", 0xe0, 0x4}, {&(0x7f00000006c0)="fd16f079aa513687a2f6932102097fee236226eb7d4de777b42f0d4f088de416bdd63191dd39f4bd000125760d25c38018921a0915d048fe8ed342d408de0401fe95a4445b3b0fe3421ff76768a105cb5b78f9af6d0dd1cf5e821541199006f5cecf08c1c5bd056943821c3bdcf2a08a9a3b78a54699cdf70642ef17e154c91dfdb6b54b4733", 0x86, 0x5cdb}, {&(0x7f0000001800)="12655f5ed1623ce535321bdd1091f1bfd58b487b09e6fa11e090a7f9e7300f3eef2e10038385d3effb29e407b5a3ed62f65cfe14e428c316882cd26f4b7f815ff6c003d4927e53547db20683ca7bc5685a4a880c0040c7cfea6b6aa0a93f4f29d8d9b90a11f8914e41452bee", 0x6c, 0xb94}], 0x40000, &(0x7f0000001940)={[{@huge_always}, {@size={'size', 0x3d, [0x2d, 0x37, 0x30, 0x35, 0x60]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x6d, 0x37]}}], [{@obj_user={'obj_user', 0x3d, '9p\x00'}}, {@dont_hash}, {@euid_lt={'euid<', r1}}, {@obj_user={'obj_user', 0x3d, 'net/icmp6\x00'}}, {@euid_lt={'euid<', 0xee01}}]}) 13:50:57 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x5f0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:50:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617600020801000470008400f801", 0x17, 0x10001}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000480)='./file0\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:50:57 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x65c) [ 1902.478438] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:50:57 executing program 6: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x2) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:51:11 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x5aa) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:51:11 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x5f2) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:51:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) symlinkat(&(0x7f0000000240)='./file0\x00', r0, &(0x7f00000002c0)='./mnt\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:51:11 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x0, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:51:11 executing program 5: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r3) connect$unix(r3, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:51:11 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x620e, &(0x7f0000000180)={0x0, 0x4ac1, 0x0, 0x0, 0x2df}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r2, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a64485f108d23b76be1cc06a8682449c18157c739b4f25f709ca", 0x1a}, {0x0}, {0x0}], 0x3}}, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23, 0x1, @local, 0x100}, 0x1c) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$inet6(r3, &(0x7f0000000180)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c, 0x0, 0x0, &(0x7f0000000240)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2c}}, r5}}}], 0x28, 0xfffffdef}, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)={0xa, 0x4e23, 0x3, @empty, 0xfffffff8}, 0x1c, &(0x7f0000000880)=[{&(0x7f0000000340)="b2c73d3c925c6568f33cd1e795fdbbb81e093835eb77924792c74340200123ecf092a2457f592e54f406cc85eb94ad7fe91a6916f470016e04d6b51a3d432044e9885247ea1bcddab8b5fbd5f71bf0dc895c5e8060c002a4d2a860a186cd8b43f0ee2a31240551bf3b768342efc710b04311309bb8516719d4bd43ea4996625e15896b690efdeed7b3191937427627f963cecda4a0284870c74f34c47c8e807c22b8221060f68f6622d66b51e37e2519b8163a984c255d190fbdd42a79d63c80cc05bdba7d9b35bb92495e", 0xcb}, {&(0x7f0000000500)="6e1c0da6151afaa8adf64fa2cfc48e29830883a4169f951a6886e4f18758ca7ec581df733f8b9db5a74c16a8ab3ad6e824e7b6a1b01b66474da3bdc8094c90313fe9dd4428ad2b7dc243c6e2f0e2373b5f99d2ea0b17131d96202ce43bd3fe32d8a5105f025e5aec430296fef6b2c2e053f480e3b05ffb349822d90d750081846345874b8b119eb000d2cae354635fdd4a758600df06273e0481ab73ae6da846c9d68fd41b9f97d3", 0xa8}, {&(0x7f00000006c0)="da6b84132b4c8abbfb2c5971bf0158f326888351d959023ef98778b01a9a66211d30fe744fffbf132d0cf9714290682e387fdc80f38456f6844d696224ad3178ebea924f142ef5ceaa1c223917e24a839600e2137837917b5a8581d93b15c75744778bff3d30c6cdbb337639aa0fc89f6598b34bf71c1c8d0be9209f31b27b2c69260bce9afd8bf5bf335bbfac91cbf2c320fb90226996a11cc617e1ee08178fe556f97d368cedc07e4ae10d7845e2a9bbff19ff5c3541208de04b1891c1918c67a1ffcd5b9a6c53", 0xc8}, {&(0x7f00000000c0)="ec03de8f9af7ae", 0x7}, {&(0x7f00000005c0)="8b0e9359f02ef0c7deb593d5fe8df3df4f160cc4871e6d0419f30f9ccae9601a95687fbf35cb7dba859748eeb3cf6fcc32b969311a9af9c627ae7f94605618c1ab35a4251121ca732d052ea841c6c6711d438b914171947df5531c1cf32719642b891c71ad6cba74e662118eda06a90b37754420b6716fb4e4", 0x79}, {&(0x7f0000000940)="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", 0xfc}], 0x6, &(0x7f00000002c0)=[@pktinfo={{0x24, 0x29, 0x32, {@local, r5}}}], 0x28}, 0xc000) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r6, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:51:11 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x67d) 13:51:11 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:51:26 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x613) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:51:26 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(0x0, r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:51:26 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x5ac) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:51:26 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0x0, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:51:26 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) 13:51:26 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x67f) 13:51:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './mnt\x00'}) mkdirat(r0, &(0x7f0000000240)='./file2\x00', 0x21) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:51:26 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$inet6(r1, &(0x7f0000000180)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c, 0x0, 0x0, &(0x7f0000000240)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2c}}, r3}}}], 0x28, 0xfffffdef}, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000500)=@report={0x108, 0x20, 0x800, 0x70bd27, 0x25dfdbff, {0x3c, {@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@broadcast, 0x4e22, 0x0, 0x4e24, 0x3ff, 0x2, 0x0, 0x80, 0x6c, r3, r4}}, [@algo_auth={0xa7, 0x1, {{'sha1\x00'}, 0x2f8, "5db720ddd0eb83f2616db7afbdc879d189f3138239240ac8a5c3bd7b3d06f18ceded90e8e4d95e11326a0daef42ba3e743178d5e3f5f88d1bc648bc9df03cec7c825ed54d0f29d1fed648e6c455a38217ee41f6ff5f6425bf5248cc0858b98"}}, @coaddr={0x14, 0xe, @in6=@mcast1}]}, 0x108}, 0x1, 0x0, 0x0, 0x24004805}, 0x40000) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:51:26 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) (fail_nth: 1) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) [ 1931.009540] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:51:26 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x6a0) [ 1931.085308] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:51:26 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x5, 0x3, 0x100, 0x7, 0x6940}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:51:26 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x615) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) [ 1931.102114] FAULT_INJECTION: forcing a failure. [ 1931.102114] name failslab, interval 1, probability 0, space 0, times 0 [ 1931.103178] CPU: 0 PID: 51399 Comm: syz-executor.5 Not tainted 5.10.225 #1 [ 1931.103911] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1931.104792] Call Trace: [ 1931.105084] dump_stack+0x107/0x167 [ 1931.105490] should_fail.cold+0x5/0xa [ 1931.105947] ? getname_flags.part.0+0x50/0x4f0 [ 1931.106437] should_failslab+0x5/0x20 [ 1931.106863] kmem_cache_alloc+0x5b/0x310 [ 1931.107303] getname_flags.part.0+0x50/0x4f0 [ 1931.107794] user_path_at_empty+0xa1/0x100 [ 1931.108242] do_fchownat+0xe1/0x1e0 [ 1931.108637] ? chown_common+0x500/0x500 [ 1931.109051] ? ksys_write+0x1a9/0x260 [ 1931.109462] ? __ia32_sys_read+0xb0/0xb0 [ 1931.109965] __x64_sys_chown+0x77/0xc0 [ 1931.110390] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1931.110937] do_syscall_64+0x33/0x40 [ 1931.111342] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1931.111889] RIP: 0033:0x7fe8a81c1b19 [ 1931.112277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1931.114222] RSP: 002b:00007fe8a5737188 EFLAGS: 00000246 ORIG_RAX: 000000000000005c [ 1931.115050] RAX: ffffffffffffffda RBX: 00007fe8a82d4f60 RCX: 00007fe8a81c1b19 [ 1931.115815] RDX: ffffffffffffffff RSI: 000000000000ee00 RDI: 0000000020000040 [ 1931.116592] RBP: 00007fe8a57371d0 R08: 0000000000000000 R09: 0000000000000000 [ 1931.117362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1931.118035] R13: 00007ffe46fa9e5f R14: 00007fe8a5737300 R15: 0000000000022000 13:51:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000380)=@file={0x0, './file2\x00'}, 0x6e, &(0x7f00000009c0)=[{&(0x7f0000000500)="fab77e75a76c754df8bfb765f9906dc872ffa263b152751c193d3a6e0a8d4e0d4e5b22748318fcc1b1995d507bf024c31a240f14e0adcb8014e9793fc97cf31f3cffc313bc21b3902459b30c4cde7ac3905be7c735799b592c1eff30b108f31b92181638ddcdf21e6293cd1c0627b2d0a5dad4304f88ef28fc5eef0c64e284e502aa4129f6c1671508fc46b5ded5758b0a3494c33264f16a86e671b67aae07eff66e216c4c84d78c76fe5c153c0b71299b8cd2e2f0d7d381fd372a0c852eb7e9a752da50bb70830da703159a44ed5bb4a2", 0xd1}, {&(0x7f00000006c0)="00d36d49af7b3106320c5c639174c89353a4d4a2149dfcee0daefa5c25a9ece1d00942e8af1129dc3036c006d3fe65a20423ce3f5d92169923a1b4e038add54f77c7522bf160edca46ca7ebec32f20ab737f98245e498174a04bbb7ccbb7da40d555c136a17a4a6420", 0x69}, {&(0x7f0000000800)="edecb576a532d2ed3988c2c9b635d43008402f1318cab6e49140fa4c4d5574b30468d9dbe15f38f33cd56331308ab8097843003924ba8b926d241a52d41389e76ddf98a39d685be552aa0d3c9a74a48f200d0227cc22565edaeb8a860eead9ec444f9130e0b52c9d62707d8013528cb1ee8cec5d760ad2ba19fe31da6d9a5ef6f16955b07bdd2c0c44f4ca5fdce2d1d25dea044b7b940507bca542", 0x9b}, {&(0x7f00000008c0)="eaaa4ceb2880678c5ef96afceec0529a29245b3a78576ada8c92bf9583c246b9cdda3eb1c38cff461752ed1cd48c4a4401d4f98d682e4e4ea66120be290298176d012bc00600db1bc8d3e2ee4a45c7aadeb8aa40703b2f4a8661dc0687c5acd117cc5541087425cbd64a5f1975aaad73dcda59e52fbd7b82ee44220b290e97d007cfe887b6d67f8e17aea448a5f3dcbb1ee6b2a6cb8a2d567b523177446dbe7e9706659ab78451217b3d2bcb749642f9d7a30b7cf4795169e970cecbe9d7b88d93e08ee320be4980b37ab88ef8d76488ae6a472c16c6aa7b0f", 0xd9}, {&(0x7f0000000740)="a02f88066d1ec904c4ca2a6829344de61b38021f6b03d0c59aa4386b06286a34012f4160c8d37c9f13fb0de2a90e03035b21743965f5dee0af5ae458f6e5dfdcb3696f5a891f937ca7c4db426602911caac0ceb7e369671193b463d3c8158a1728", 0x61}, {&(0x7f0000000240)='.', 0x1}], 0x6}, 0x800) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:51:26 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x5cd) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:51:26 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 1) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:51:26 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0x0, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:51:26 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x6a3) [ 1931.223934] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 13:51:26 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) (fail_nth: 2) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) [ 1931.249132] FAULT_INJECTION: forcing a failure. [ 1931.249132] name failslab, interval 1, probability 0, space 0, times 0 [ 1931.251874] CPU: 1 PID: 51603 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 1931.253460] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1931.255391] Call Trace: [ 1931.256003] dump_stack+0x107/0x167 [ 1931.256851] should_fail.cold+0x5/0xa [ 1931.257740] ? getname_flags.part.0+0x50/0x4f0 [ 1931.258840] should_failslab+0x5/0x20 [ 1931.259701] kmem_cache_alloc+0x5b/0x310 [ 1931.260636] getname_flags.part.0+0x50/0x4f0 [ 1931.261640] getname_flags+0x9a/0xe0 [ 1931.262499] do_mkdirat+0x8f/0x2b0 [ 1931.263298] ? user_path_create+0xf0/0xf0 [ 1931.264251] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1931.265427] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1931.266604] do_syscall_64+0x33/0x40 [ 1931.267444] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1931.268612] RIP: 0033:0x7f063061cb19 [ 1931.269450] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1931.273865] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1931.275756] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 1931.277502] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1931.279277] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1931.280895] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1931.282623] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 [ 1931.297122] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' [ 1931.330972] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:51:26 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x6c4) 13:51:26 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 2) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:51:26 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x636) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) [ 1931.359504] FAULT_INJECTION: forcing a failure. [ 1931.359504] name failslab, interval 1, probability 0, space 0, times 0 [ 1931.360592] CPU: 1 PID: 51861 Comm: syz-executor.5 Not tainted 5.10.225 #1 [ 1931.361170] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1931.362174] Call Trace: [ 1931.362733] dump_stack+0x107/0x167 [ 1931.363523] should_fail.cold+0x5/0xa [ 1931.364347] ? create_object.isra.0+0x3a/0xa20 [ 1931.365350] should_failslab+0x5/0x20 [ 1931.366174] kmem_cache_alloc+0x5b/0x310 [ 1931.367063] create_object.isra.0+0x3a/0xa20 [ 1931.368008] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1931.369127] kmem_cache_alloc+0x159/0x310 [ 1931.370038] getname_flags.part.0+0x50/0x4f0 [ 1931.370997] user_path_at_empty+0xa1/0x100 [ 1931.371910] do_fchownat+0xe1/0x1e0 [ 1931.372703] ? chown_common+0x500/0x500 [ 1931.373550] ? ksys_write+0x1a9/0x260 [ 1931.374385] ? __ia32_sys_read+0xb0/0xb0 [ 1931.375264] __x64_sys_chown+0x77/0xc0 [ 1931.376112] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1931.377216] do_syscall_64+0x33/0x40 [ 1931.378033] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1931.379131] RIP: 0033:0x7fe8a81c1b19 [ 1931.379948] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1931.383973] RSP: 002b:00007fe8a5737188 EFLAGS: 00000246 ORIG_RAX: 000000000000005c [ 1931.385640] RAX: ffffffffffffffda RBX: 00007fe8a82d4f60 RCX: 00007fe8a81c1b19 [ 1931.387183] RDX: ffffffffffffffff RSI: 000000000000ee00 RDI: 0000000020000040 [ 1931.388746] RBP: 00007fe8a57371d0 R08: 0000000000000000 R09: 0000000000000000 [ 1931.390300] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1931.391848] R13: 00007ffe46fa9e5f R14: 00007fe8a5737300 R15: 0000000000022000 13:51:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {r1}}, './mnt\x00'}) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r2, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1931.570929] FAULT_INJECTION: forcing a failure. [ 1931.570929] name failslab, interval 1, probability 0, space 0, times 0 [ 1931.573504] CPU: 1 PID: 52058 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 1931.575014] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1931.576817] Call Trace: [ 1931.577380] dump_stack+0x107/0x167 [ 1931.578177] should_fail.cold+0x5/0xa [ 1931.578995] ? create_object.isra.0+0x3a/0xa20 [ 1931.579988] should_failslab+0x5/0x20 [ 1931.580807] kmem_cache_alloc+0x5b/0x310 [ 1931.581707] ? ksys_write+0x21a/0x260 [ 1931.582524] create_object.isra.0+0x3a/0xa20 [ 1931.583487] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1931.584587] kmem_cache_alloc+0x159/0x310 [ 1931.585499] getname_flags.part.0+0x50/0x4f0 [ 1931.586457] getname_flags+0x9a/0xe0 [ 1931.587269] do_mkdirat+0x8f/0x2b0 [ 1931.588026] ? user_path_create+0xf0/0xf0 [ 1931.588929] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1931.590068] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1931.591207] do_syscall_64+0x33/0x40 [ 1931.591999] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1931.593117] RIP: 0033:0x7f063061cb19 [ 1931.593914] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1931.597956] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1931.599601] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 1931.601149] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1931.602702] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1931.604252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1931.605795] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 [ 1931.628421] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1931.633473] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1931.643577] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' [ 1931.651172] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1931.653516] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 13:51:46 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0x0, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:51:46 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x638) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:51:46 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 3) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:51:46 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x5cf) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) [ 1951.673102] FAULT_INJECTION: forcing a failure. [ 1951.673102] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1951.674333] CPU: 0 PID: 52287 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 1951.674915] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1951.675609] Call Trace: [ 1951.675843] dump_stack+0x107/0x167 [ 1951.676160] should_fail.cold+0x5/0xa [ 1951.676489] strncpy_from_user+0x34/0x470 [ 1951.676845] getname_flags.part.0+0x95/0x4f0 [ 1951.677222] getname_flags+0x9a/0xe0 [ 1951.677541] do_mkdirat+0x8f/0x2b0 [ 1951.677847] ? user_path_create+0xf0/0xf0 [ 1951.678217] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1951.678665] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1951.679105] do_syscall_64+0x33/0x40 [ 1951.679422] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1951.679862] RIP: 0033:0x7f063061cb19 [ 1951.680182] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1951.681727] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1951.686394] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 1951.686990] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1951.687590] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1951.688184] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1951.688779] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 [ 1951.691519] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:51:46 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 4) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:51:46 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa8040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x6, 0x5, 0xfd, 0x6, 0x0, 0x3, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x20, 0x4, @perf_bp={&(0x7f0000000000), 0x5}, 0x80, 0x3d, 0x7fff, 0x8, 0x4, 0x9f, 0x9, 0x0, 0x7, 0x0, 0x101}, r2, 0xffffffffffffffff, r0, 0x2) readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:51:46 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) (fail_nth: 3) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) [ 1951.740552] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:51:46 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x6c7) 13:51:46 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f0000000600)='./file0\x00', 0x200) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72741d30696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file2\x00', &(0x7f00000006c0)='mnt/encrypted_dir\x00') mount$9p_unix(&(0x7f0000000240)='./file2\x00', &(0x7f00000002c0)='./mnt\x00', &(0x7f0000000380), 0x56, &(0x7f0000000500)={'trans=unix,', {[{@privport}, {@noextend}, {@access_user}, {@cache_fscache}, {@afid={'afid', 0x3d, 0x100000000}}, {@msize={'msize', 0x3d, 0x2}}, {@afid={'afid', 0x3d, 0x67f9}}, {@cache_loose}, {@msize={'msize', 0x3d, 0x5}}, {@access_user}], [{@context={'context', 0x3d, 'staff_u'}}, {@dont_measure}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}]}}) r1 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) chdir(&(0x7f0000000300)='./file2\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r2, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000480)={0xe, 0x17, 0x2, {0x5, './mnt'}}, 0xe) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xc, 0x10, r2, 0x10000000) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000400)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, {0x0, r4}}, 0x8) [ 1951.757102] FAULT_INJECTION: forcing a failure. [ 1951.757102] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1951.762287] CPU: 1 PID: 52412 Comm: syz-executor.5 Not tainted 5.10.225 #1 [ 1951.762833] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1951.763477] Call Trace: [ 1951.763694] dump_stack+0x107/0x167 [ 1951.763985] should_fail.cold+0x5/0xa [ 1951.764293] strncpy_from_user+0x34/0x470 [ 1951.764626] getname_flags.part.0+0x95/0x4f0 [ 1951.764977] user_path_at_empty+0xa1/0x100 [ 1951.765315] do_fchownat+0xe1/0x1e0 [ 1951.765606] ? chown_common+0x500/0x500 [ 1951.765923] ? ksys_write+0x1a9/0x260 [ 1951.766251] ? __ia32_sys_read+0xb0/0xb0 [ 1951.766580] __x64_sys_chown+0x77/0xc0 [ 1951.766890] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1951.767298] do_syscall_64+0x33/0x40 [ 1951.767595] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1951.768002] RIP: 0033:0x7fe8a81c1b19 [ 1951.768299] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1951.769740] RSP: 002b:00007fe8a5737188 EFLAGS: 00000246 ORIG_RAX: 000000000000005c [ 1951.770367] RAX: ffffffffffffffda RBX: 00007fe8a82d4f60 RCX: 00007fe8a81c1b19 [ 1951.770930] RDX: ffffffffffffffff RSI: 000000000000ee00 RDI: 0000000020000040 [ 1951.771498] RBP: 00007fe8a57371d0 R08: 0000000000000000 R09: 0000000000000000 [ 1951.772064] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1951.772623] R13: 00007ffe46fa9e5f R14: 00007fe8a5737300 R15: 0000000000022000 13:51:46 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x659) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) [ 1951.806232] FAULT_INJECTION: forcing a failure. [ 1951.806232] name failslab, interval 1, probability 0, space 0, times 0 [ 1951.807706] CPU: 0 PID: 52436 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 1951.808291] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1951.809003] Call Trace: [ 1951.809237] dump_stack+0x107/0x167 [ 1951.809562] should_fail.cold+0x5/0xa [ 1951.809892] ? __d_alloc+0x2a/0x990 [ 1951.810213] ? __d_alloc+0x2a/0x990 [ 1951.810546] should_failslab+0x5/0x20 [ 1951.810880] kmem_cache_alloc+0x5b/0x310 [ 1951.811234] __d_alloc+0x2a/0x990 [ 1951.811541] d_alloc+0x46/0x1c0 [ 1951.811833] __lookup_hash+0xcc/0x190 [ 1951.812160] filename_create+0x186/0x4a0 [ 1951.812507] ? filename_parentat+0x570/0x570 [ 1951.812887] ? getname_flags.part.0+0x1dd/0x4f0 [ 1951.813295] do_mkdirat+0xa2/0x2b0 [ 1951.813601] ? user_path_create+0xf0/0xf0 [ 1951.813973] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1951.814421] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1951.814870] do_syscall_64+0x33/0x40 [ 1951.815189] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1951.815624] RIP: 0033:0x7f063061cb19 [ 1951.815949] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1951.817503] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1951.818169] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 1951.818766] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1951.819364] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1951.819959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1951.820561] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 13:51:47 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) (fail_nth: 4) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) 13:51:47 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x0, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) [ 1951.924138] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:51:47 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) stat(&(0x7f0000000000)='mnt/encrypted_dir\x00', &(0x7f0000000080)) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 1951.958987] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 1951.968053] FAULT_INJECTION: forcing a failure. [ 1951.968053] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1951.969112] CPU: 0 PID: 52815 Comm: syz-executor.5 Not tainted 5.10.225 #1 [ 1951.969702] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1951.970409] Call Trace: [ 1951.970642] dump_stack+0x107/0x167 [ 1951.970954] should_fail.cold+0x5/0xa [ 1951.971284] _copy_to_user+0x2e/0x180 [ 1951.971622] simple_read_from_buffer+0xcc/0x160 [ 1951.972029] proc_fail_nth_read+0x198/0x230 [ 1951.972406] ? proc_sessionid_read+0x230/0x230 [ 1951.972809] ? security_file_permission+0xb1/0xe0 [ 1951.973236] ? proc_sessionid_read+0x230/0x230 [ 1951.973637] vfs_read+0x228/0x620 [ 1951.973946] ksys_read+0x12d/0x260 [ 1951.974255] ? vfs_write+0xb10/0xb10 [ 1951.974587] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1951.975047] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1951.975497] do_syscall_64+0x33/0x40 [ 1951.975824] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1951.976263] RIP: 0033:0x7fe8a817469c 13:51:47 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x5f0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) [ 1951.976583] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1951.986609] RSP: 002b:00007fe8a5737170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1951.987252] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe8a817469c [ 1951.987848] RDX: 000000000000000f RSI: 00007fe8a57371e0 RDI: 0000000000000004 [ 1951.988449] RBP: 00007fe8a57371d0 R08: 0000000000000000 R09: 0000000000000000 [ 1951.989044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1951.989644] R13: 00007ffe46fa9e5f R14: 00007fe8a5737300 R15: 0000000000022000 13:51:47 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 5) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:51:47 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x6e8) 13:51:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000240)='mnt/encrypted_dir\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r0, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) unlinkat(r0, &(0x7f00000002c0)='./file2\x00', 0x200) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1952.062562] FAULT_INJECTION: forcing a failure. [ 1952.062562] name failslab, interval 1, probability 0, space 0, times 0 [ 1952.063810] CPU: 1 PID: 53002 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 1952.064363] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1952.065018] Call Trace: [ 1952.065237] dump_stack+0x107/0x167 [ 1952.065531] should_fail.cold+0x5/0xa [ 1952.065843] ? __d_alloc+0x2a/0x990 [ 1952.066144] should_failslab+0x5/0x20 [ 1952.066452] kmem_cache_alloc+0x5b/0x310 [ 1952.066778] ? __d_lookup+0x3bf/0x760 [ 1952.067090] __d_alloc+0x2a/0x990 [ 1952.067375] d_alloc+0x46/0x1c0 [ 1952.067649] __lookup_hash+0xcc/0x190 [ 1952.067958] filename_create+0x186/0x4a0 [ 1952.068283] ? filename_parentat+0x570/0x570 [ 1952.068636] ? getname_flags.part.0+0x1dd/0x4f0 [ 1952.069018] do_mkdirat+0xa2/0x2b0 [ 1952.069308] ? user_path_create+0xf0/0xf0 [ 1952.069647] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1952.070078] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1952.070491] do_syscall_64+0x33/0x40 [ 1952.070789] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1952.071197] RIP: 0033:0x7f063061cb19 [ 1952.071495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1952.072981] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1952.073599] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 1952.074196] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1952.074770] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1952.075333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1952.075906] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 13:51:47 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) 13:51:47 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x0, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) [ 1952.124872] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' [ 1952.173011] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:52:01 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x65c) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:52:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e643d72646d696d65810000000000000000"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1965.959323] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:52:01 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x0, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:52:01 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x5f2) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:52:01 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 6) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:52:01 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x6ea) 13:52:01 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r1, 0x82307202, &(0x7f0000000500)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x10080, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r2, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r2, 0x0) mkdirat(r2, &(0x7f0000000100)='./file0\x00', 0xd0) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) 13:52:01 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xb, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 1965.999869] FAULT_INJECTION: forcing a failure. [ 1965.999869] name failslab, interval 1, probability 0, space 0, times 0 [ 1966.001088] CPU: 0 PID: 53356 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 1966.001672] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1966.002384] Call Trace: [ 1966.002619] dump_stack+0x107/0x167 [ 1966.002934] should_fail.cold+0x5/0xa [ 1966.003264] ? cgroup_mkdir+0x254/0xf50 [ 1966.003610] should_failslab+0x5/0x20 [ 1966.003944] __kmalloc+0x72/0x390 [ 1966.004249] cgroup_mkdir+0x254/0xf50 [ 1966.004579] ? cgroup_destroy_locked+0x710/0x710 [ 1966.004989] kernfs_iop_mkdir+0x14d/0x1e0 [ 1966.005345] vfs_mkdir+0x493/0x750 [ 1966.005654] do_mkdirat+0x150/0x2b0 [ 1966.005968] ? user_path_create+0xf0/0xf0 [ 1966.006334] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1966.006783] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1966.007225] do_syscall_64+0x33/0x40 [ 1966.007546] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1966.007981] RIP: 0033:0x7f063061cb19 [ 1966.008300] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1966.009847] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1966.010508] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 1966.011113] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1966.011719] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1966.012322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1966.012924] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 [ 1966.099905] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:52:01 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x3000003, 0x30, r0, 0x1a67b000) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:52:01 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x70b) 13:52:01 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 7) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:52:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f00000002c0)='./mnt\x00', 0x49ee2903, 0x6, &(0x7f00000006c0)=[{&(0x7f0000000800)="8d7f2e3de89399083d6be2587da1e304a329df2f4f7844640436a9e27d53b425778b6249ce5d6abba7b5af258350a0ed0d4c92e800374de23d0788cf6d3f852a1fec6f174c4a8ae17dcf0426a64d2277efb07c4110561760e4c30f3bd798876947f55a4458cd693569bc13af5d0ca17f4e95521c81e22e9bccfef6c31b523cb4e044260a1699466c95947c0b4f526c0315f5794b485decc0766a40e280ce6687f25a6c56cde778d906431e354cf67bbe6f1667039219c6fb8d7f5179e98aa1f7765b76837e1b9ef359b1de4c85e79bea76cdcd635a925d11db609ded7e7d88c19c02c206feb601825fd6054494208dd429ba9f2f1b2090270ddfdce82ac6c70ba00a01202cbaa2a1e2dd25149329c567bc442007760ea086640fe5f05ecb54c4bb27db9bd2fa609390a1409da51c2effc1e2cec7e9a939f86e7febf912eabaa86f0a66f92f23edb2de6b40debc3b6a7c7c37af98a1298ceca34e35dcbce42c897679cc59f2b4ed1f6682f9999ca8563f70fe53d4b0873ed4576c3b16fa145f2a3812b0cd819d311452293df8166e77dc5b8e1fada0660429ca09fbe5bec9623278fe3b5f35cc1968a2932502765a1a89d70c8668200e1bacf705e69b9ecd3577ee69c156a4780b5ac277c8b4d8264b20290f02257876177b80b2a0135defc8f64efab3c71c14fe971e4ca96fb1208364a6c7a41b7cd40f4354cc8f4ddfab803459896264dac9e8c479912e12888f987d469e790bcb81809b974d67923f7e99198ea761256905f2ab7573dea7f0d42a931cd888572ff521a64f0e52db46c3a06fc4b61d1381cd70f3432d1290c3fad72ef6bea9d5c9a32fef708056ceecd63ef8fbaa74972b3b31c95785a6b37ea0e9cfb256a81cd23619f156106576ed51cecdcbd24722321b43e68a0691be669b016d77cafab004ce806f1bdbf8ab379c9996c8caa56cf82a4882f8cf30a132e14151e3f5404cb54c2dfe2bb2cffd9bfdc4627e3150de35894384680ab443a83f4c830d40864338d213d758b83be40615da2c65501a19bfbfe2ac0ffdbeef65c9f3ddebc845fc2509d474025e2f293e18a876bf121d7102f5ae15867302db435b69ef4ac08df47ea1c57543ca0a189c2a860fd8bd21f8266a75da4d7699ec7ada6910e75b0abbb7c716ce0b13615d257895c796dedf860d3077817d5552e7fcd497c92a63e6393312f47dd320163d568a067839f7ded5906c4412cc9694e9f7b13efb3d1cb2eba6ccc196d93d76057fd264a4f78df17b1632caa99297ae0a931b5090b0999a30cc6c13b2657500a4a920437177ddc429d3f1815fda5bb9b5e7a21815ce786346958417ebd12eacec865f6ab7cbaf4e3200a26c9480254b6ba6f13d3460d2060166745e9bf1a420af5807698495bd0d07e06ae6650096b051537df135ba84febb7fc3e9adb60be27cb9c8fc6bdc27277bc93e7277082761a68359a28083467b3d801da1a51a6c0fa0a878d258580c16316d89fb87ed0b7fe33ee84bb01fdbe29a6f3ee5f58ded89f6dc43d1b70a9a2227cfb65f351bb582127ea9dd3c8e3afa5b5b1c74cc4d0ca231937c09f0538cc8c1021bd76d0e01339eccef074c17b203aa571108dc5f3329d46891cacca39e421cf09878370ab8e566d9aa66807c7fe5207038d819b7e572f5ce338b1446ceac1cfe3c5f57e07805c49f814e3a2f20b28ecc03e0f2df312aa58c269b14c042108f81c74e6f7077e22b8d6f2e1c0e74cb20691994c2a5e59c38bc74bf0806a8f5381caa5ae8a28363874a5a74e04f906d11d661d90240f941e7eeec14ba0060f0f6e6c746e27de7ad155efb19e0611d73ddc7f63c9d2ad824fca347bb21b1d425b1c7c4a209afcfb0b7e0f4fbe098de4f4f048060543f28f086f91914b00039f4a15952ebf4f24bddefc0cf21bc7f50974731a42b61944adec12b271f9d4fabacfd500932fa4050e7e58cfd6c54b1e0804662c7911a38191acfc953fee00a38ab2914ccec5652f820a4aed1a1b128ae5af9e40766834b6b150adf6f71fc5f5c06f251e7b9556e0acc6fc965fdb5782d07e02ef2ba3278f6b65c4fa5fa87320df543fa1116ac88741a2257ca21d831722db65b435e27ade77d62fdf11325aaffefe25233c2265953f02f540d046fa1a1d9c1a42f5cc05da2270ca78ecbebbe13b9410357c0b45efaae298a0601e23363a6867afdb2171129d33374c8b3e590b0507480338bbdc37643cbeee07c1bf3b7d58c25255f93aecf7e08be4a79919da6e630b9eae661ebef794304ea4fcf35fff4746542ffa100d5c896b7bc3bfee4a7cb6086a31b3389f5f1621acda7a3e3cbe92d1af1ae4c664ff1905d5f55c560c812edd05e4f7e26b8fd59b714031ebbecd21b67f9c27943dceefce87f89ac4c4bd629b0433c8139ce7e94b4bdac003759b7620fc5b40761113c5fecd256504141ee09fc0560c934ab95824c56f2113a35b84c5403ed75e0b24883b32297c477738f1e4ed37b68df924e570c647290a48f20601b2b4d7a0bcc48be62e0224b3e4ebdd7fe04863d396367c68ef6c9fa0c70a18645e3499fe588a03b4f251bc12543f2284ec96d238ff35461a3a2e4c1595bd1b98e14f530a35fae003fade983c3e9f0f237800e01161156c963332bc8210bb7bc9192ed275a2cd7682f18a44f2f26f5db3cac257d89adea2691d19c9c1c57849357c241460caef195aad5ee5877097cb0f1bdfb5e1c1706d1855940eda4b017166e30b28ea7163ef672ccc50457b08e2c6d52eeb5c520cbafcb093c09fde49207cddba5d0cc188fa9bbd45afbace356086c41bff45749f6c95c59260831c28850d18e2099e34f7b5ed54b37fc49e65fcd194059406e0156f75555d3bf73d16d7325b557c6d4f59d2dc67e60d2ecab817148d480bc84d83b12245f959b78452eecc9b837fe33efc0b66c887dfb0801b39c975b90d21400aaf80671fe4d3452fa4e6cacf01a0a0c565252b6c88ec0493e24ec503a4e84938e030d441d8b249caa942194416ca43e1efe572e1fe9dcdb4cba1452464b210955616f31fbd8b3d6ad70d8eec436a65ce05eee45b62c4c6ccc04c6e38004bc5079e07626f0e2104d96a2d55050a92e9b1fc51cfeeadd938ae0d00154919d7e215a42e0c19bfa034c24f46f6df4ee8a8db7836b070821b0c84419abe90f2ec5bd7aa97662773ec6961071f91a8e264348d95429b11e87d043b058ae200c4651e0a83273d969f3e81c01c6c7dbba9d1c5dfd3e77de01200a49fb1db761369094528951ea727f972ba40d9137fcdce2cdc13728e57bb0d7dc664e2bf129826baac8720c0d5e99b831c14e089f85d170845d835e1a9d3675c0c3704921e715d0ac586362b6c5476d1ee0a9594f3acb461bcc52f0e3308f5bd9e173a899a8d17acf0b04acf421292b5a7d61929e5df22bd4c244a5868af3201ba5fefb394512532afbbe8301d30610881d255a18bc1423636b50b88d5fa9b4cb0040cd22e45267bb846482f848c70be84b467262ee7bebca56898a5b8511cb21f92760a094ea7d9c74b3495408a32479355c9cdbec2f1bdcb752257f65bbef474346022ef479aa3d4a1a5fad699fc237e7591f8861afb45d8fd71bff38dec1a377486e19b5907fbee80cc948b4e8fe049d50c8f85c3203a823fc4525456e2c7b82ac79d2f7f0342bc48a94810c83e29a64b720b912c265bb25274757445ae39f908e6849f9c53f71db54d8b3ed5da9472e3796fe79aee9c54a862ae117973418a052f12ecff6501e56df775079cb08a008cd3c61d0a705698fc17035721d322c0e19f9ed2e2f062b7eba4b1684d8287315f46ba82a5f1d60804e103ac962c659c74112ab530b98b7f26e5efdabeace50769562626350f6a5d983bcb11731a3e735065ac5a93a9df520b7f8bc575dc4a1ce69004f65ca91da7dd3a28e0b35f090453a227f5bf1ec6b5597c84c7048cb3ddde51c527f9ea7455d0f375d9847334c18b75a731aff2dd5b7d2b7dd9a33e20dc86bb8dc0ea41a0c756b78d051d598c749b6fcb2078bf8c023cd73a79c8335c28cf3a694601d337d0518b3469f9353254bbc6540c658134663589a21c0374300a05755430396e29c6f1accb7b50e68f2424beef73509433c4f9b719d60afc2d8263189ed0bb1c311567fc4f20150a76eef33bf66e43b52cddb9ccfcfcf2b4ef37b17b97fbf9fb463afdcd4e94cfa98ece45f1553befa0c76c4e304d6823680a70221914c7699266509e3528e8c07c3afc31f2e0a33de2002a98678ddda428c2148c8a4b8b7d40e6039c53e83af78796aa0c9a34662b8f58d9800d575941bbe0eb69f52df937f5557bc0e2528f62413cc7dab0800a5e6592ca9e0087f25a42f7e938b1a49ef06c9835e422e3def6554db35290c4cc68b408fc0bebf8173754ece24e592e8e12368af13494cd8638ccb78088e229b0d0b5b7d9764c61de661cb3a7f6a45c7f07ab6a31d7f57d3ff81dbba490f710bd48354caa83863809fb41206430a444b2a38b2673894c1b60b8c2a4585a00481dd3fdd879ceb01d075e3eb0c250fedd12849f677f523f31329b3cadf81e360b345fe1190b88890c246f541c6237a5d8e01a8c056fcefc41c6db74f20faf4506142c6b77d448133cb5a94a8cc7d0081feb23847afc41abceafa0c6f9a3a42b6d3e8be008d1a85dbc35bd8eb8f5e0b72cda67f1975dba93b9fd75b748650c94aa6ea2c3647c51a0bd112c4748a61df0d6b509c8b33af669220b0c88b6585ee50c3838dfbe93b56fe859bb3072344357972175866bd63634dcbb7640694084665eedacd8ebe47dc95bd202ec9a95d24e1a139b450b98dcec25f6419aee4f2dade5fc61d4f6e76d55df107e18fa42601eb7fb0ef90ca352108b456387c5cbc3fbc4cd722f9d634ab3c5e3a404eb6392b34659e11bce2a05031a064c90936c98b50b32a3c905acf9045b34b6cb36a37d6276449279a81aa844045d0afe783121272929844e410f26e8c24cb308f765283e15b1306d80efc0873351b010398003d6765390406234b93e98b164900ebb1f4c175739c21af6aef6e28bdf4c4cfee745e30c8b2f5de58e07fbed6580377a7e116c1401091402a17a998d8d67338a98fea4149709e35b927436c633dead42d29a6089892ed35af79d9adfd151ea7ede77cdb2a0ce5febe38d8e2e67572bd335b26f96d2f254acc6d048be134fb46546525868892e1fa99964ee7039498416f0d24ce668fa1aeb0a4134c575cbcc4cd334eb20bf07e5089f5a27c29a507a0414f279e6f3fd20c2081849fea05b956455bc64270fa8f5447666d18022f0489a10e52402ee1e0adda266445352726fc7aa9e2fbe79ef243b90d05e0f9e3b52a8e565d9ccb4bab1ca4b32598b0f67515165604bf9af08e74f9fdd8e918060e29a7ed0e8faf307bfc473fa7133ee02981cf12a70773842cda37fab1b41dffbae7494c0360d88909f2cd1cfcec752578fd6bf7425988f78ed5c15ee3032d81a3f1392b8d9d7a9120625075123e79d3d72516e4fd8fc6981f08ba8b3d3585e8a57db35fb5225b4482c0a7fad7b03d5bfcc3867e011025a377ea65d83e174f56bf5c2662d1752213c690602bb6ffb08efa1d30c0d0a85b6179dd04ae29ae005e7f01fa47a5660a71aee1b4d6c059e130390fe7a73d026cfdfd19e9b53ea4ceb3ae177b26fdfff7c1b31d2309c5d131b113f763806e185e7d4f568237186b26c4cb4dfe652892ea77682764c2c15b18753f726a4ba235bec422e0c8e0115fd9ffadae404bbba3d156d32ec42b9e3cb2223d", 0x1000, 0x10001}, {&(0x7f0000001e00)="8c8df2f37ff24b6058f776f12e0e05d75f774082640582cdfabbde9ca4bd99fb615a41c71c059bca814d52555f61068bde3493fe053119a32ea090c7a180b56cf6390128877abe8919d859702ce8488af728b3fa294ab893f211907dd45122dba027b9ad0840d3a3a49d404121b6e3a1020e7117eec38e69ec10a31be6c1497fb8a4981a3c9a632847d7c8683a49962956de5c27c41f066ce97622d073ef6f6d1a8cb8a7cf54ed6c6b0da0aa319147ca86ed4120d9c9fa027ca0ad8592d8bb4db371f1c966caf38304874ed4a8002bfffb958470c7e38999804d17338369c8f11d063feb01201581c191e9117490d142614c7ffb649255f20a068d2c9e61ab1a953243a16cb7abdee50839cf1aadec6672f0d2281aa6efc5093af25d902051bfe564573965192f11235857a9e84fda3dae86f2f2bd921ab221860ded46eed5ff88b71eac05145bc0903d3040f81d7cfdab9d4c3f09b1fb8e9bc1dfccf559c28085a8ddd0f9e43202dff5716907de44eff79d132ed3813e3f9be7f6c839b08ca400e5129f9891b5c89479ad1dad072499f5cbe212ed13bf790c44668e015a5151b49314e210699cb9cb9e987e14f5af1768f13df503cb1774eb6c1ec54ea87cada2c5059176992520654e16cf9958691b786a70a15860e72344d42faa3522dd30ae254485cf46e583e026b322a4314b7cc8de60211c3a30fc29fe93560f71aabaf8a0f14eaf12a9d118070685ed527ece245b03745280ae0f5f5420984c6a046f9d8a5cf9ece5f3ed2b32ccddd5f948b682a7c070afa58b995cc68d166e0b30a21ec0e6ccf16a415afddd2ade44191c9a2a27f4d0cf43eb10b93176fd7f8469098a9e90cc325511548512b20edafb3021f8c52a41d57cb12cbdbe921626a0d9a549396530346f4cbf8dee3d56293f3b6bd994e418d0b134e36925414f9e63741ad3f6f46a8cac9dd95265b5927649e54879678e3d2cc8fd8ecb5c1c6dd036d0503e219f4636d66ebc122bae407c314a7ebc13dcf35504021230086afd90e2d822c01185ac3cbb882ffa0c3d6af4cc4b340f0a4c09a4d5b2cefa03f62611149f650980852f7509a79b0ac9a9c5e7573c30a83ac0cb17a9152671c68d985da99f323f15246a3f4604b297ad28c9987869ff0522fb23dc767e743b43654f469dea66bdc292c191c5274d2b46d801a63f4d92ee9ebb4a5e475d4b618a09c83fef33b2cc6dc960887a22d118f30091aa6ceadbfa5dc7ab72211b1b8e786f432f2cbb158650ff905b058dd48415687a6600de882c3c2b22c34e216d469adb8345ff3fc422f741ea2c2b72c42099653a6c1b6120b82036fd1b883b399a3231aaeb38c96af1573888215ecadd843dc5234b1426c8ed525072c775160aa309f4e7f009d64a64ceb375840acd968bde261804b47ccdeda22373c0fc349473619a3fc5451dffc823ec5c72418f7e6d93810a1cc12b0857477689fa8c7e9207288ff76d6304def6adcc36643dc97a75879526f1c7c4189cafb77cca27694887c7585eeb76a8172449a7ca6ac2fa5e9aee650a81911ab3441de3aefcc1c1504bbf9ce77350f94632e0ec6a5d08187652670ff71abebd580dd0e21ce136898125398b4dfbaedc88655656b390660f464e5b55443c78e23dbc47c1ae36e79fea9b112bd68596a2fd4812081d8d04a91e4a70791f9c619969eb16c8102e183c2cf69797e5bed524ecbe49ec68532ddcc04b4d400ca51c5ac12f1b980e04d38a889c1753ebc425ba7001528384e21334a3f8e1601d272b74afde49e78326b8ee36bbcd2dc57b79cf4fc3e10db01f5ed587fa28f31188aa8e97675660182570d05ada89005141ec126a29f68dad60694990beb5680c29b7e2c0f2d3a0213b664ffa83df842609c9e98529225cf33853566454c4314c2a36aab82271534ca01d90f4619015761e21f72333ca4c58b8a35ccb1af585843faf81a181f3ab0414732e8a3ce0006da0baf0fd6d313a2162e5e8202f4d0223c565aee1aa607a332a0fda4a8ab4ab9ce226dea0ff4f0952735d34cb307313d215d328919b045d6764eb4f0ba85439b90fd01366d6b576508b50e9541ff7284151a8b01f4985f45e8a6e496b38bb9070396031e1122eacf41492a80f9d0491b9eca2aee7ad2d7546d303817b3dd364a51d66ef96a71f3414af997d0fd0210799e0dd99876ffadf29385a9770b92cd3df4a52147feea0de8277ef4d5497a0ad4c6668b4ffbd7a6955227673ed99b29d5815ff02478fa548242c09fddbd8aaf889db8597d6284d951df06de8c9c5ef04f692483672db0ecec58d2f9cfe87e39b31384a294e6aaa5347e5363663f4a9ecf2e7438e784e4d290f41ddeea412d206f23465d28dad24ae0548cc2d6fe787acee996e7cd32b522be4f5246e7439efbe2c2efcda22bde3fe051335ad808bcd5b86230f1a5b71886fbb6f7d61a273b84c5477cc282136b9d1588614d20f8daa4423f02e3016759f3985c59ab597c68e00cce81b9eee29d3dde2dcb47d4320c9db174f8fa0f6fab54a034a7d21ccebb7f30106b6cfdbac7030622cebc574a66706c56f05c958d15c633257151be2befa3879fca414449a87afe3550277e96beb8b717121d9b65240fe4b6857196bcef9d0c58389afe19176296fdd1b3fb9a805707302aad55bb735fdb47bc6f4e2f2b9008ca120e09ec93c27f3355d8a77888835dd1e4ab55344f857b3b02ec6f4195cb515aaca04814bef6f657591d8728497f810bc1deafbaf0918e6589e31823419d3d62544269e447e9ecb018618d0054f66dd4e25200dec0a3cb6a96f01c87510519a36a5b09c4e1d8c832e9e079e827326ec0e67ca965371da343d6f35015c90ce0a889e0fdb77efd363959fe53f4c712ae2f3c6bc9e3d3325513f1180aeb7339bf1eb78203bfb571cafef9a88ca20247002d11a1ca69023c0bbb3163fe46bcfa9586e202512dec5bbeda1a080539d4e6a71d92d862673477cc376fd1115eefda478141f0886e4c886d24fead2573f329eed2c73205701c58ad8085b2a0fdab09f50519c324555975f360f1236ad0ec6994adfb59fce3ea8be9ee283b2221735d49c45d34a72cdae4d7a29241c5fa6b7b5ca15ad11942793149c6e736cb01c7c20d49653f41249442608534168f7713810661f5cb702ad12442cfb9d85a0b4a0809e2877738bb7405221eddfd3f571620339dec41dffe9782cce611c421a7089655a52e0f577ba017623016bde1d89087f687805713b2da3d4c88803131f2f0a9e58dfcde97a813c393887ed910c7b12babf0106d392c46a138c2d503cfb836d78e7cffa3b5360627c47d08625cd8eaff399869e379ab2174b8088573846e19d1b538d781caff950295878f34131deca15f407b416023b2fccd14f70b6be0e3333a5a3fb4ecdc73128b7c3cdcfd177e0760e561af403a1b9cab64b2af4f5a8473f95eff4f93a56ed8c14a05a6c1e0da3a746bd1e899db3ccf9b6d14390ea59767d3854c58ea30a5003f2b7ae2c15b58cf0237e6cafac4847f9a1ce48235bb172c5b186fffa803ed4057a8a86140d29e97e9fe9decbb7830ff30250b4d3ed522677ae03e34668ef59dda260398ec6b1699922783cdca481d2e8cfc232ed12375ddfa4ac9fa4b6bacc6fd64fa0d4196e95e8ec7d00dbd685bdf3e2a888b5071dcdadf064b2a221b051ee412a35eebe6fa959874f9a908ec43b97b9b60687815e5cb97c389679af8a857be01f6d9784b80b800f1a4a165ae21fa16869f9a1f8657abb006c28f0115a58dfbb6bd83bd7e27f3605bfc0a2dff188eddccd03b23aa12039e42f7b2cd2c85ca66c57cc7e924313b918c3751a6c81d2b10211b16f5b1cb21bbb66c5a56e663a9f48a0a49bd01df763a9ac751c906895280b4de2bd06c654dd41c0b1b10543a77e09b405f632214abca46725ce3929fc72e8fd3ca82c42fe85c37233519965d0891d276c137aa507f18d5c15776dfc04f54c15cceaab43d13d30756c4f26e9a8db3c102b295e4b47c3ff0063a152c8fef86a73d44188b9ef341164f08b9316d7dfe0c17c7e276920068cb581b28b99dc1f4f5e6d4f5f47d503ac6844114b903b5e98249523108addc53282a9d2a7525f4e03e4338cc68f56645fdc03c497961b582956fa051c0a1f39bc073fbbb57c6de50c0ca8d4be445b670600fb1402416dd0bd62f2d041e994b9c0836716deea14dd2fc390125f305f664791e02514bdaa2a2af552e34e2531a622707dc8e19d320befb95662aa03519c07a5fa43e4c1914decd91cb335e73c63345bb4b452be0e5dc934a9fa9e7a61e0ac9860602427b51013426a5bb6cfe94542e2fcd104665f865b61b7576cf022404652eab882bdfff6acfa42e29f3833f5bc9c2419976de34aaa843487dad110f949fffbe4df26ce7982f188e16a71378e1eef30a80fa20ada3094956ad14ee1cf0970fbeaa1e5777f7f89ed3400c8e1f77ce945e9931d790a21ca11a85b6d6a8271d1265f8c73c1359da4b84cfb5c7843e160b8d9495589fe00b10c0122eab8109e6ea9616b066aaf1041fb6744689ee2b6a0908ad83dd82787c3ea742f9ea310f156fd16a16466f4fc9c5a15cb6bb06e8091a73a08335f139323974a48c8e032134a618f23397cee77c7f52d45293a565cc848da346cae6d1aef8c575455212093b088877daf657ab596b23b3eb1337aa422b3cde2f6d9b722c4b2c67868eaa5ac08876a373e05a827fffc87756454ccecbc6f7a2118e60b438eb749a8f41574b66d4d2a5d3eebecfeb07a67a8258db5606fcd350edc99b676bf9ab42469f7fb005240c90ee02b28019da80f10d93f6e2b1fe769e7a5dac3954c739877d205126de9386bd23bf9b51b4cf470f3a3316a83d57378288a6c2ca872e64006ea9189a8d2eb4bf020356ac07d30336b43f045c6202035fa4826ba0d7d915aae196c4a4afbb2db1a149c714b1ce7fbff0c63d5929b28a46801b26ad8302921a522cf104b83553fd1248b886a8e28b35568029d395305170c911f89fa209cb472a090405758dc4a1ca23d6cd00dc0cd41e80fe1a4fac76672918c943d45a9126c9e187b0b8448c88a8c2003ad75a800ebaa0f0d1629d16807694af4627d61a68bc6005c71e7ff533cb265d3e56042ed31e5584ad06a21a0e86b9cb520a7ab19e10a063a4ec1cff15cc3edacf9e11a51840eae39defc23442f6e668689b8f41500331986c116d76a26e79b87bdd72f12d0aac8c1ae9202cfd8b586a33a50d3ce41049c7a697eba539ff603ee1d315351b23e79af79d87afaedfafa65fe55e701814c12fab5c20bc21a71c7a643fbb191239011e8338fe545f9941fbd3b5dc442696a8fd4a7b9fbb4182a36500f907c247d1d66b170035d9f955a228c3976904b9e0e79a00ce3b4711d76402fcbf687e01c108347e1e7e2b588f5c9c42fba81ef6be4f90138a11069cbd8858930985a747d1c0c980cb2be50fbe9a0b32744c0f1c9ccdc225878b9f4a28358c1bc57aba6cfc61d5d25b9c134c0eb2080c371b796425206ebfb58f29e504de5524bd3e3eacb1584aa5c018eb1e8357b0f71aca792ba6eb35a4266665a8334168e868540697955ff06423091f8820df3df167520d807e61f7e2efcbc600ec4a28454b5b77cf4cfb9fdea37b3c82f38ad7aaeb8e678baa93a7901baa289da1922fc02a664f8dac1ba3e199c2bf268f5355cf3b693296428a27fd26bfbb781f2493a0a2fceb8e59ad412aa1a32233f8456dfc2f6d1830f0fa70e845c4e4dbfcac4e20a6aaafb8e8e533fc12d18afb9", 0x1000}, {&(0x7f0000000380)="5bce4393c3fdc9246615e016b580fcceb98c9c6146796a7d435eb95abaff964d2d571c62f18f7487720b424ff8165acb6916765e8fc586c10c52e2580c1e47600674b50104ddd6fd57f18d833ef97f5133aae6c2bf6430dde12397f4e54f88e3908f2fa4ca193e0839288519ac933cc97cca8413ce6ec4cd29780ce82bcc3079b170ee4284cdabe8", 0x88, 0xd0}, {&(0x7f0000000500)="efe9509ca4cbab79c32cffce9886fb0a08beba29108c1de5a75cc9096a8669e3187625ffd2f741a0acb5f7bc652bf4477c", 0x31}, {&(0x7f0000000540)="f23423c964d42cea5111d53bd36d0796838bdefe10bd82153e91656ed11a43737410164783c188be20e7ff573c48ba2fc337f26c2b47a1880801ccef322080ea73495eee73c60b708f5e28d9bd91e8e2a172a5591eea8ba3614597155fa3a0cd53ef367e371dfcff9e5a7a0186ea9714ac81d29a9624d36c76f92acf", 0x7c, 0x7}, {&(0x7f00000005c0)="38282ecaa7e85c97b68cd29fc286ab0e73a9dd79526c4cf62b8a3db66612bcf269636c947c9d42eef5c603dfbc606d450b765f19ecd4433d0871f21d8fe5d0b78ffb924dd7d62ab07645b9cb68a349f8efa4a4c44c2c48dbeeecf2b1fdc59610e999ae0ba5670a4d6c", 0x69, 0x8}], 0x88, &(0x7f0000001800)={[{@dots}, {@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0x1}}, {@nodots}, {@nodots}, {@dots}, {@nodots}, {@dots}], [{@dont_appraise}, {@uid_eq={'uid', 0x3d, r1}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@appraise_type}, {@uid_gt={'uid>', 0xee01}}, {@measure}]}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r2, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r2, 0x0) openat(r2, &(0x7f0000000780)='mnt/encrypted_dir\x00', 0x200, 0x40) 13:52:01 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x67d) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) [ 1966.278620] FAULT_INJECTION: forcing a failure. [ 1966.278620] name failslab, interval 1, probability 0, space 0, times 0 [ 1966.279958] CPU: 0 PID: 53980 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 1966.280538] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1966.281234] Call Trace: [ 1966.281549] dump_stack+0x107/0x167 [ 1966.281876] should_fail.cold+0x5/0xa 13:52:01 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x613) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) [ 1966.282219] ? create_object.isra.0+0x3a/0xa20 [ 1966.282659] should_failslab+0x5/0x20 [ 1966.282986] kmem_cache_alloc+0x5b/0x310 [ 1966.283340] create_object.isra.0+0x3a/0xa20 [ 1966.283717] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1966.284152] __kmalloc+0x16e/0x390 [ 1966.284466] cgroup_mkdir+0x254/0xf50 [ 1966.284797] ? cgroup_destroy_locked+0x710/0x710 [ 1966.285204] kernfs_iop_mkdir+0x14d/0x1e0 [ 1966.285558] vfs_mkdir+0x493/0x750 [ 1966.285865] do_mkdirat+0x150/0x2b0 [ 1966.286190] ? user_path_create+0xf0/0xf0 [ 1966.286550] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1966.286997] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1966.287439] do_syscall_64+0x33/0x40 [ 1966.287758] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1966.288192] RIP: 0033:0x7f063061cb19 [ 1966.288509] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1966.290055] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1966.290713] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 1966.291314] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1966.291914] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1966.292516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1966.293118] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 13:52:01 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x70d) [ 1966.416951] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' [ 1980.296518] FAULT_INJECTION: forcing a failure. [ 1980.296518] name failslab, interval 1, probability 0, space 0, times 0 [ 1980.297850] CPU: 1 PID: 54402 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 1980.298920] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1980.300824] Call Trace: [ 1980.301392] dump_stack+0x107/0x167 [ 1980.302181] should_fail.cold+0x5/0xa [ 1980.303015] ? create_object.isra.0+0x3a/0xa20 [ 1980.304018] should_failslab+0x5/0x20 [ 1980.304836] kmem_cache_alloc+0x5b/0x310 [ 1980.305724] create_object.isra.0+0x3a/0xa20 [ 1980.306717] kmemleak_alloc_percpu+0xa0/0x100 [ 1980.307699] pcpu_alloc+0x4e2/0x1240 [ 1980.308540] ? cset_cgroup_from_root+0x2a0/0x2a0 [ 1980.309553] percpu_ref_init+0x31/0x3d0 [ 1980.310454] cgroup_mkdir+0x28b/0xf50 [ 1980.311298] ? cgroup_destroy_locked+0x710/0x710 [ 1980.312326] kernfs_iop_mkdir+0x14d/0x1e0 [ 1980.313228] vfs_mkdir+0x493/0x750 [ 1980.313993] do_mkdirat+0x150/0x2b0 [ 1980.314823] ? user_path_create+0xf0/0xf0 [ 1980.315730] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1980.316887] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1980.318005] do_syscall_64+0x33/0x40 [ 1980.326924] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1980.328171] RIP: 0033:0x7f063061cb19 [ 1980.329031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1980.333112] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1980.334808] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 1980.336347] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1980.337894] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1980.339472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 13:52:15 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006d00210c000000000000000000020200fb97c1b8b32feaeee2bedfe61000000077a718593ab4016f58febe2e0fe38b5541e7044228187890fd40fcc55730119e05d45d01297d37d8e33543bff50ea71355695b81da22f4ea63701f4c8af3c811f5765756c286f9eab01a0f5f3679013f2c59b9928804e8d96ca8cec2dd67e91cd4a925aee3ab1ec244770ff231b5414a5fbba62fcffc851b92c0e54b4099a91e2e3775e539b958fed8396ca7085677b95543f92ae6fac3db7b7c02fcc96c3bebf4659ccf3292d405a6f250e3bf7149a4a12de1f0e1bff4ed4c3afdb99d1ace1e63f2e82f42af766b109c0a0000000000"], 0x24}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r1, @ANYRESDEC, @ANYRES16=r0, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) 13:52:15 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 8) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:52:15 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x67f) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:52:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) mount$9p_unix(&(0x7f0000000240)='./mnt\x00', &(0x7f00000002c0)='./file2\x00', &(0x7f0000000380), 0x20000, &(0x7f0000000500)={'trans=unix,', {[{@uname={'uname', 0x3d, '**#)[&)..'}}, {@noextend}, {@msize={'msize', 0x3d, 0x20}}, {@uname={'uname', 0x3d, '9p\x00'}}, {@access_any}, {@noextend}, {@cache_mmap}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@uid_lt={'uid<', 0xee00}}]}}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:52:15 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='mnt/encrypted_dir\x00', 0x8, 0x6, &(0x7f00000008c0)=[{&(0x7f0000000340)="3cd11e65deb23f22db6d7513f6d9b5c12617affcf93ac69d83fab3d3fa182677944eaa8cc5b8513f03cd9506f2df14786522a7969e3f46b28d53b704169d5950c7b6c14fb47f444ebee13622bc100ce0691baff2eff6f3217d4a756cf2d611de8243dd1fc6017d0eb9b308465ab0f37b671f8e7a9bd672cda2d59075a5fa688223a65252f9e411314748db7d29330b9a8c89e5d3416d92384106d7ecb82fe44ee078bfafa70188fddfa27046dcae1d66a1f9509b49d0bff8bfa762ea8ed6433afc24a68bb92f1464a80bf75b5c05d5b0", 0xd0, 0x8}, {&(0x7f0000000500)="9176175bcf193557274e6facd3ac055f5de2c278162fd56936146522f59ff628f1318108e09af4d67330d4e921d59b5aaf27fa19b7e243aa9888457dbaf071876635857b451d1e10ab8258ddaa4527f7baa1447cf113d5451f0261ca7dcfee53218f72e1419a755632f0b468fe61c3b7b9162705de56d03ee1187e6adb4f9599f3c1871dad980001463a4e1baf5da08d243f121bfd09bb071fec906e6eedf0d272ee615877e58ef33d94e7f659a3a4b4c87bc797b11f6a68f47648edb8d7265a0b716d58ebbbf7ebbeeb74ad2ef7b6815462945c", 0xd4, 0x5f}, {&(0x7f00000001c0)="f643edd0968f980c74ecaa6d9be129e4b5a743b7c2f749626b6d0fe236429faa1f92b0d8609400348fafb54673c15336afc307b6575e539d4c68a7f44d685c8df8778c728b807f67d77f0aa0bdd671c461b7281dae43dfcc2825330bc81ac88c252694245c5d98b5a5ea70a1ffbd68748b059ac3b7c506a9902661f84ccb12f445dd80d8cefe7230864a68a0a84c4c717c42fa26cdecbc89521bbab51d8d08a170", 0xa1, 0xafe}, {&(0x7f00000006c0)="7ab336e3488e8fb87460369a13874ec1285ee94a15ea233d111ef3e515152f339b6e971d34263f2fd54084674a56f90659603c7d9499ea56411c32ccae4e78bb30ab3797a1371b7519eda79014fbc7d754da9b679c25ead7fe9fd8004f7a6b3f770bfd7dcfa37351a6839ed6f3bc6867118d295cc5bb2775e68c536def5dd4f032888995998f31c4f7213b1229679b4942cf589494a442fb49bd2f4a0ccd31b6", 0xa0, 0x2}, {&(0x7f0000000800)="746b14fbc65b16f5e6ab9a0d71bb9421b0e7c4102e6ea26c5f2f306fa681bc398a3c2f53b9f5bb7a9a69015e87b4ee609611db139520dee84db068f89fbef9a53a639a4614a206f0807d06cb42ec68a5342ca8d6cc567d298eeb8906aede3ccbf46f27a6cb67e81caa29bf31f1d3ba15f6edfadc7cb83197fa44803b94903ce1de", 0x81, 0x6}, {&(0x7f0000000100)="4e35fd3815ed227a60be4821c502bfac2cf60dc83adf5850a36c692210227e8c59d3ae1513e737d00f37a00a542814fd0e11a3f64ac43db30f1711bbd5090a818b2b07796c6abf75e64007dc15bb81afa5fcf88383ff6970f0f0ad", 0x5b, 0x6}], 0x40, &(0x7f0000000980)={[{@size={'size', 0x3d, [0x37, 0x67, 0x34, 0x36]}}, {@huge_never}, {@huge_always}, {@nr_blocks={'nr_blocks', 0x3d, [0x35, 0x74, 0x37, 0x31, 0x38, 0x30, 0x65, 0x39]}}, {@huge_never}, {@huge_always}, {@mpol={'mpol', 0x3d, {'prefer', '=relative', @void}}}], [{@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@smackfshat}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) chdir(&(0x7f0000000000)='./file1\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:52:15 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x72e) 13:52:15 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x65c) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:52:15 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x615) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) [ 1980.340998] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 [ 1980.383922] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1980.385943] tmpfs: Unknown parameter '0x000000000000000418446744073709551615' [ 1980.406492] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1980.411340] tmpfs: Unknown parameter '0x000000000000000418446744073709551615' [ 1980.414147] audit: type=1400 audit(1725803535.623:25): avc: denied { read } for pid=54404 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 13:52:15 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x730) 13:52:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f720000197830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:52:15 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) r1 = epoll_create1(0x0) r2 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000200)={0x20000001}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f00000000c0)={0x20000004}) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r3, 0x64, 0x0, 0x1000002) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="1c000000810000000500158738fef6c87d3b804e00000075099406bd9c1a370000005e767a2b7188d92e1240db1fa9cad862fda51b7f76c8852695ff33ead1b2"], &(0x7f0000000340), 0x400) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x100000d, 0x100010, r0, 0x0) symlinkat(&(0x7f0000000100)='./file0\x00', r3, &(0x7f0000000140)='./file0\x00') getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) [ 1980.546320] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 1980.556970] audit: type=1400 audit(1725803535.765:26): avc: denied { block_suspend } for pid=54926 comm="syz-executor.5" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 13:52:15 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') readv(0xffffffffffffffff, &(0x7f00000007c0), 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x4000, 0xf1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:52:15 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x6a0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) [ 1980.606822] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 1980.607111] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:52:30 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x636) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:52:30 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x25) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) 13:52:30 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x6a3) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:52:30 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(0xffffffffffffffff, r1, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/drivers\x00', 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:52:30 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 9) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:52:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d611304d2e54fb4316ca52888a76f2c706f72743d307830306532342c"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:52:30 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x751) 13:52:30 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x67d) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) [ 1995.484512] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 1995.487480] FAULT_INJECTION: forcing a failure. [ 1995.487480] name failslab, interval 1, probability 0, space 0, times 0 [ 1995.489605] CPU: 0 PID: 55251 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 1995.490652] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1995.491360] Call Trace: [ 1995.491597] dump_stack+0x107/0x167 [ 1995.491913] should_fail.cold+0x5/0xa [ 1995.492239] ? create_object.isra.0+0x3a/0xa20 [ 1995.492632] should_failslab+0x5/0x20 [ 1995.492958] kmem_cache_alloc+0x5b/0x310 [ 1995.493313] ? mark_held_locks+0x9e/0xe0 [ 1995.493667] create_object.isra.0+0x3a/0xa20 [ 1995.494057] kmemleak_alloc_percpu+0xa0/0x100 [ 1995.494464] pcpu_alloc+0x4e2/0x1240 [ 1995.495360] ? cset_cgroup_from_root+0x2a0/0x2a0 [ 1995.496188] percpu_ref_init+0x31/0x3d0 [ 1995.496891] cgroup_mkdir+0x28b/0xf50 [ 1995.497564] ? cgroup_destroy_locked+0x710/0x710 [ 1995.498393] kernfs_iop_mkdir+0x14d/0x1e0 [ 1995.498803] vfs_mkdir+0x493/0x750 [ 1995.499111] do_mkdirat+0x150/0x2b0 [ 1995.499424] ? user_path_create+0xf0/0xf0 [ 1995.499781] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1995.500226] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1995.500668] do_syscall_64+0x33/0x40 [ 1995.500992] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1995.501441] RIP: 0033:0x7f063061cb19 [ 1995.501772] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1995.503371] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1995.504013] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 1995.504617] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1995.505217] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1995.505834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1995.506454] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 [ 1995.595097] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:52:30 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x753) [ 1995.610161] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:52:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)={0x34, 0x36, 0x1, 0x70bd25, 0x25dfdbff, {0x19}, [@typed={0x4, 0x4f}, @generic="56d07853db6b74e7b01a207a09b3d32269416ccc32597aef713c08"]}, 0x34}, 0x1, 0x0, 0x0, 0x400c880}, 0x1) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x52, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732ee96174000208010233a6000200f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000380)=ANY=[@ANYRES32, @ANYRES16, @ANYRESHEX, @ANYRES16=0x0, @ANYRES16=0x0, @ANYBLOB="c9a906c041c529b05727209ef3e4249e9510a0705d03ca3350c269c782e489a0a2dbeb813da441841811ca3f1d0e5983106954de55f38ae61dc7aab4a149b1cdcd2a03bd5b71fbe23a8df2f271e0280caa", @ANYRES64=r0]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') socket$netlink(0x10, 0x3, 0x0) chdir(&(0x7f0000000300)='./file2\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r2, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:52:30 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e643d72646d696d65810000000000000000"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:52:30 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x638) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:52:30 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 10) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:52:30 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x10, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) 13:52:30 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x6c4) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:52:30 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 1995.741320] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1995.742776] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1995.778278] FAULT_INJECTION: forcing a failure. [ 1995.778278] name failslab, interval 1, probability 0, space 0, times 0 [ 1995.779427] CPU: 0 PID: 55823 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 1995.780009] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1995.780700] Call Trace: [ 1995.780932] dump_stack+0x107/0x167 [ 1995.781245] should_fail.cold+0x5/0xa [ 1995.781572] ? percpu_ref_init+0xd8/0x3d0 [ 1995.781933] should_failslab+0x5/0x20 [ 1995.782261] kmem_cache_alloc_trace+0x55/0x320 [ 1995.782683] ? cset_cgroup_from_root+0x2a0/0x2a0 [ 1995.783086] percpu_ref_init+0xd8/0x3d0 [ 1995.783433] cgroup_mkdir+0x28b/0xf50 [ 1995.783763] ? cgroup_destroy_locked+0x710/0x710 [ 1995.784173] kernfs_iop_mkdir+0x14d/0x1e0 [ 1995.784530] vfs_mkdir+0x493/0x750 [ 1995.784840] do_mkdirat+0x150/0x2b0 [ 1995.785155] ? user_path_create+0xf0/0xf0 [ 1995.785518] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1995.785968] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1995.786410] do_syscall_64+0x33/0x40 [ 1995.786749] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1995.787186] RIP: 0033:0x7f063061cb19 [ 1995.787504] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1995.789060] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1995.789709] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 1995.790314] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1995.790936] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1995.791542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1995.792148] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 [ 1995.804155] FAT-fs (loop2): Unrecognized mount option "ÿÿÿÿÿÿ0xffffffffffffffff" or missing value 13:52:31 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x774) [ 1995.839883] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 1995.849418] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1995.855219] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' [ 1995.863288] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:52:45 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f0000000600)='./file0\x00', 0x200) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72741d30696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file2\x00', &(0x7f00000006c0)='mnt/encrypted_dir\x00') mount$9p_unix(&(0x7f0000000240)='./file2\x00', &(0x7f00000002c0)='./mnt\x00', &(0x7f0000000380), 0x56, &(0x7f0000000500)={'trans=unix,', {[{@privport}, {@noextend}, {@access_user}, {@cache_fscache}, {@afid={'afid', 0x3d, 0x100000000}}, {@msize={'msize', 0x3d, 0x2}}, {@afid={'afid', 0x3d, 0x67f9}}, {@cache_loose}, {@msize={'msize', 0x3d, 0x5}}, {@access_user}], [{@context={'context', 0x3d, 'staff_u'}}, {@dont_measure}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}]}}) r1 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) chdir(&(0x7f0000000300)='./file2\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r2, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000480)={0xe, 0x17, 0x2, {0x5, './mnt'}}, 0xe) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xc, 0x10, r2, 0x10000000) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000400)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, {0x0, r4}}, 0x8) 13:52:45 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x777) 13:52:45 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x6c7) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:52:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e63397b783030653234ac74696d658110eb303030302c00000000b4c2d95e7332476921241761e09067bd051ac37f6fb4559ab008374ceec9bed74b2a4eba5bb6f52ee1225501e4612531edf2c9bcc7db593431eeaf8c002da210ddf825d7814d248a8fb7813f02700eadade1091e7f6c377507d31b4afeb4ed2829641ce226e73006af56a808c5387ad3d4c7439c0d83036ceec81c0c7de6955ff0151befb78599dbd49f44d25a8238dfefcad677b4a0ffbf150ea1aefa1e6b4753f83b0cfcd506066c3b19919d403a479f"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x18, 0x40, 0x5, 0x0, 0x9, 0x9008, 0x9, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x1, @perf_bp={&(0x7f00000002c0), 0x4}, 0x8120, 0x1, 0x0, 0x4, 0x100, 0xfffffff8, 0xfffa, 0x0, 0x3, 0x0, 0x8001}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x2) chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) mkdirat(r0, &(0x7f0000000240)='./file2\x00', 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:52:45 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 11) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:52:45 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000100)='btrfs\x00', 0x40000, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) 13:52:45 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x659) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:52:45 executing program 1: munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_IO(r0, 0x127f, &(0x7f00000003c0)={0xe00, 0x0, 0x0, 0x0, @scatter={0x5, 0x0, &(0x7f0000000440)=[{&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}]}, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000c, 0x13, r1, 0x81) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r2, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r3, 0x4004f50d, &(0x7f0000000080)) [ 2010.527287] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 2010.543236] FAULT_INJECTION: forcing a failure. [ 2010.543236] name failslab, interval 1, probability 0, space 0, times 0 [ 2010.544531] CPU: 1 PID: 56316 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 2010.545178] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2010.545939] Call Trace: [ 2010.546206] dump_stack+0x107/0x167 [ 2010.546554] should_fail.cold+0x5/0xa [ 2010.546960] ? create_object.isra.0+0x3a/0xa20 [ 2010.547398] should_failslab+0x5/0x20 [ 2010.547757] kmem_cache_alloc+0x5b/0x310 [ 2010.548169] create_object.isra.0+0x3a/0xa20 [ 2010.548592] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2010.549064] kmem_cache_alloc_trace+0x151/0x320 [ 2010.549497] ? cset_cgroup_from_root+0x2a0/0x2a0 [ 2010.549931] percpu_ref_init+0xd8/0x3d0 [ 2010.550307] cgroup_mkdir+0x28b/0xf50 [ 2010.550676] ? cgroup_destroy_locked+0x710/0x710 [ 2010.551128] kernfs_iop_mkdir+0x14d/0x1e0 [ 2010.551527] vfs_mkdir+0x493/0x750 [ 2010.551866] do_mkdirat+0x150/0x2b0 [ 2010.552209] ? user_path_create+0xf0/0xf0 [ 2010.552603] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2010.553090] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2010.553570] do_syscall_64+0x33/0x40 [ 2010.553920] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2010.554403] RIP: 0033:0x7f063061cb19 [ 2010.554764] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2010.556394] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2010.557090] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 2010.557740] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2010.558389] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 2010.559057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2010.559709] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 [ 2010.585976] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2010.586891] blk_update_request: I/O error, dev sr0, sector 7 op 0x1:(WRITE) flags 0x4800 phys_seg 32 prio class 0 [ 2010.587969] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2010.588487] blk_update_request: I/O error, dev sr0, sector 263 op 0x1:(WRITE) flags 0x4800 phys_seg 32 prio class 0 [ 2010.596510] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' [ 2010.607696] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2010.608407] blk_update_request: I/O error, dev sr0, sector 519 op 0x1:(WRITE) flags 0x800 phys_seg 16 prio class 0 [ 2010.648310] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 2010.672867] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 13:52:45 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f0000000600)='./file0\x00', 0x200) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72741d30696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file2\x00', &(0x7f00000006c0)='mnt/encrypted_dir\x00') mount$9p_unix(&(0x7f0000000240)='./file2\x00', &(0x7f00000002c0)='./mnt\x00', &(0x7f0000000380), 0x56, &(0x7f0000000500)={'trans=unix,', {[{@privport}, {@noextend}, {@access_user}, {@cache_fscache}, {@afid={'afid', 0x3d, 0x100000000}}, {@msize={'msize', 0x3d, 0x2}}, {@afid={'afid', 0x3d, 0x67f9}}, {@cache_loose}, {@msize={'msize', 0x3d, 0x5}}, {@access_user}], [{@context={'context', 0x3d, 'staff_u'}}, {@dont_measure}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}]}}) r1 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) chdir(&(0x7f0000000300)='./file2\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r2, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000480)={0xe, 0x17, 0x2, {0x5, './mnt'}}, 0xe) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xc, 0x10, r2, 0x10000000) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000400)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, {0x0, r4}}, 0x8) 13:52:45 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x42100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x2, 0x0, 0x0, 0x206, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000380)=ANY=[@ANYRES16=r1]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') r2 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) chdir(&(0x7f0000000340)='mnt/encrypted_dir\x00') r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r6}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_TIMEOUT={0xb, 0x1, 0x0, 0x0, 0x5, &(0x7f0000000240)={0x77359400}, 0x1, 0x0, 0x0, {0x0, r6}}, 0x1000) chdir(&(0x7f0000000300)='./file2\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r7, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') name_to_handle_at(r0, &(0x7f00000003c0)='./file2\x00', &(0x7f0000000400)=@FILEID_NILFS_WITH_PARENT={0x20, 0x62, {0x10000, 0x4, 0x3f, 0x200}}, &(0x7f0000000500), 0x1000) 13:52:45 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x6e8) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:52:45 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 12) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:52:45 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x798) 13:52:46 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) tee(r0, r1, 0x3, 0x8) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) [ 2010.850247] FAULT_INJECTION: forcing a failure. [ 2010.850247] name failslab, interval 1, probability 0, space 0, times 0 [ 2010.851968] CPU: 1 PID: 56806 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 2010.852595] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2010.853332] Call Trace: [ 2010.853587] dump_stack+0x107/0x167 [ 2010.853922] should_fail.cold+0x5/0xa [ 2010.854276] ? create_object.isra.0+0x3a/0xa20 [ 2010.854710] should_failslab+0x5/0x20 [ 2010.855071] kmem_cache_alloc+0x5b/0x310 [ 2010.855456] create_object.isra.0+0x3a/0xa20 [ 2010.855876] kmemleak_alloc_percpu+0xa0/0x100 [ 2010.856295] pcpu_alloc+0x4e2/0x1240 [ 2010.856668] cgroup_rstat_init+0x14f/0x1f0 [ 2010.857070] cgroup_mkdir+0x709/0xf50 [ 2010.857433] ? cgroup_destroy_locked+0x710/0x710 [ 2010.857882] kernfs_iop_mkdir+0x14d/0x1e0 [ 2010.858277] vfs_mkdir+0x493/0x750 [ 2010.858617] do_mkdirat+0x150/0x2b0 [ 2010.858982] ? user_path_create+0xf0/0xf0 [ 2010.859377] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2010.859863] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2010.860344] do_syscall_64+0x33/0x40 [ 2010.860693] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2010.861163] RIP: 0033:0x7f063061cb19 [ 2010.861512] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2010.863180] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2010.863877] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 2010.864527] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2010.865168] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 2010.865814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2010.866460] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 [ 2010.894429] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 2010.903540] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:52:46 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0x0, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:52:46 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) flistxattr(r0, &(0x7f0000000800)=""/4096, 0x1000) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:52:46 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x65c) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) [ 2010.959024] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2010.984392] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 2010.989125] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 13:52:46 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 13) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) [ 2011.126234] FAULT_INJECTION: forcing a failure. [ 2011.126234] name failslab, interval 1, probability 0, space 0, times 0 [ 2011.128501] CPU: 1 PID: 57295 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 2011.130154] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2011.131024] Call Trace: [ 2011.131669] dump_stack+0x107/0x167 [ 2011.132548] should_fail.cold+0x5/0xa [ 2011.133466] ? create_object.isra.0+0x3a/0xa20 [ 2011.133964] should_failslab+0x5/0x20 [ 2011.134891] kmem_cache_alloc+0x5b/0x310 [ 2011.135334] ? mark_held_locks+0x9e/0xe0 [ 2011.136301] create_object.isra.0+0x3a/0xa20 [ 2011.136785] kmemleak_alloc_percpu+0xa0/0x100 [ 2011.137862] pcpu_alloc+0x4e2/0x1240 [ 2011.138290] cgroup_rstat_init+0x14f/0x1f0 [ 2011.139304] cgroup_mkdir+0x709/0xf50 [ 2011.139724] ? cgroup_destroy_locked+0x710/0x710 [ 2011.140813] kernfs_iop_mkdir+0x14d/0x1e0 [ 2011.141270] vfs_mkdir+0x493/0x750 [ 2011.142126] do_mkdirat+0x150/0x2b0 [ 2011.142526] ? user_path_create+0xf0/0xf0 [ 2011.143559] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2011.144118] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2011.145344] do_syscall_64+0x33/0x40 [ 2011.145752] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2011.146945] RIP: 0033:0x7f063061cb19 [ 2011.147347] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2011.151815] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2011.152621] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 2011.154291] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2011.155912] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 2011.157529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2011.159158] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 [ 2011.177196] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:53:01 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f00000003c0), 0x4010474, &(0x7f0000000340)=ANY=[@ANYRESDEC=r0, @ANYRESDEC, @ANYRESHEX=r0]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') mount(&(0x7f0000000240)=ANY=[@ANYBLOB="00f29202008000000000"], &(0x7f00000002c0)='./file2\x00', &(0x7f0000000380)='anon_inodefs\x00', 0xa, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r3, 0x4, &(0x7f0000000400)='9p\x00', &(0x7f0000000500)='./file2\x00', r1) readv(r3, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:53:01 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 14) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:53:01 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x67d) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:53:01 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x6ea) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:53:01 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) fcntl$setstatus(r0, 0x4, 0x6800) syz_genetlink_get_family_id$gtp(&(0x7f00000000c0), r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) 13:53:01 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x1000000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) stat(0xffffffffffffffff, &(0x7f00000000c0)) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = getpgid(0x0) sched_getaffinity(r0, 0x8, &(0x7f0000000080)) r1 = syz_open_procfs(r0, &(0x7f0000000140)='net/netfilter\x00') readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:53:01 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x79a) 13:53:01 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) [ 2026.019417] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2026.029413] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 2026.039696] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2026.043266] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 2026.061083] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2026.065446] FAULT_INJECTION: forcing a failure. [ 2026.065446] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2026.066784] CPU: 0 PID: 57389 Comm: syz-executor.7 Not tainted 5.10.225 #1 [ 2026.068546] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2026.070618] Call Trace: [ 2026.071270] dump_stack+0x107/0x167 [ 2026.072191] should_fail.cold+0x5/0xa [ 2026.073123] _copy_from_user+0x2e/0x1b0 [ 2026.074119] iovec_from_user+0x141/0x400 [ 2026.075130] ? lock_acquire+0x197/0x470 [ 2026.076134] __import_iovec+0x67/0x590 [ 2026.077092] ? lock_release+0x680/0x680 [ 2026.078104] import_iovec+0x83/0xb0 [ 2026.079027] vfs_readv+0xbb/0x160 [ 2026.079888] ? vfs_iter_read+0xa0/0xa0 [ 2026.080849] ? __fdget_pos+0xf1/0x190 [ 2026.081806] ? lock_downgrade+0x6d0/0x6d0 [ 2026.082894] ? mutex_lock_io_nested+0xf30/0xf30 [ 2026.084042] ? ksys_write+0x12d/0x260 [ 2026.084981] ? __fget_files+0x2f8/0x520 [ 2026.085566] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2026.085934] do_readv+0x139/0x300 [ 2026.085950] ? vfs_readv+0x160/0x160 [ 2026.085967] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2026.085981] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2026.085997] do_syscall_64+0x33/0x40 [ 2026.086011] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2026.086020] RIP: 0033:0x7f7903f41b19 [ 2026.086041] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2026.095542] RSP: 002b:00007f79014b7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 2026.096255] RAX: ffffffffffffffda RBX: 00007f7904054f60 RCX: 00007f7903f41b19 [ 2026.096910] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000004 [ 2026.097567] RBP: 00007f79014b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2026.098209] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2026.098917] R13: 00007ffc7f98104f R14: 00007f79014b7300 R15: 0000000000022000 [ 2026.102020] FAULT_INJECTION: forcing a failure. [ 2026.102020] name failslab, interval 1, probability 0, space 0, times 0 [ 2026.103588] CPU: 0 PID: 57385 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 2026.105203] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2026.107084] Call Trace: [ 2026.107705] dump_stack+0x107/0x167 [ 2026.108535] should_fail.cold+0x5/0xa [ 2026.109408] should_failslab+0x5/0x20 [ 2026.110337] __kmalloc_track_caller+0x79/0x370 [ 2026.111466] ? kstrdup_const+0x53/0x80 [ 2026.112351] ? find_held_lock+0x2c/0x110 [ 2026.113310] kstrdup+0x36/0x70 [ 2026.114074] kstrdup_const+0x53/0x80 [ 2026.115007] __kernfs_new_node+0x9d/0x860 [ 2026.115130] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' [ 2026.115877] ? mark_held_locks+0x9e/0xe0 [ 2026.117529] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2026.118655] ? cpumask_next+0x1f/0x30 [ 2026.119538] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2026.120604] ? pcpu_alloc+0x12a/0x1240 [ 2026.121496] kernfs_new_node+0x18d/0x250 [ 2026.122462] kernfs_create_dir_ns+0x49/0x160 [ 2026.123515] cgroup_mkdir+0x318/0xf50 [ 2026.124382] ? cgroup_destroy_locked+0x710/0x710 [ 2026.125473] kernfs_iop_mkdir+0x14d/0x1e0 [ 2026.126439] vfs_mkdir+0x493/0x750 [ 2026.127276] do_mkdirat+0x150/0x2b0 [ 2026.128152] ? user_path_create+0xf0/0xf0 [ 2026.129119] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2026.130392] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2026.131617] do_syscall_64+0x33/0x40 [ 2026.132509] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2026.133741] RIP: 0033:0x7f063061cb19 [ 2026.134619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2026.138992] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2026.140440] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 2026.141707] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2026.142920] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 2026.143525] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2026.144145] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 [ 2026.164376] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 13:53:01 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x70b) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:53:01 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x7bb) 13:53:01 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 15) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:53:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) rename(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./mnt\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:53:01 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) socket$nl_generic(0x10, 0x3, 0x10) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) stat(&(0x7f0000000000)='./file2\x00', &(0x7f0000000080)) 13:53:01 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x67f) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) [ 2026.444510] FAULT_INJECTION: forcing a failure. [ 2026.444510] name failslab, interval 1, probability 0, space 0, times 0 [ 2026.447397] CPU: 1 PID: 58052 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 2026.449071] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2026.451071] Call Trace: [ 2026.451701] dump_stack+0x107/0x167 [ 2026.452594] should_fail.cold+0x5/0xa [ 2026.453527] ? create_object.isra.0+0x3a/0xa20 [ 2026.454669] should_failslab+0x5/0x20 [ 2026.455575] kmem_cache_alloc+0x5b/0x310 [ 2026.456601] create_object.isra.0+0x3a/0xa20 [ 2026.457680] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2026.458946] __kmalloc_track_caller+0x177/0x370 [ 2026.460083] ? kstrdup_const+0x53/0x80 [ 2026.461011] ? find_held_lock+0x2c/0x110 [ 2026.461968] kstrdup+0x36/0x70 [ 2026.462772] kstrdup_const+0x53/0x80 [ 2026.463674] __kernfs_new_node+0x9d/0x860 [ 2026.464697] ? mark_held_locks+0x9e/0xe0 [ 2026.465652] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2026.466770] ? cpumask_next+0x1f/0x30 [ 2026.467718] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2026.468851] ? pcpu_alloc+0x12a/0x1240 [ 2026.469786] kernfs_new_node+0x18d/0x250 [ 2026.470774] kernfs_create_dir_ns+0x49/0x160 [ 2026.471857] cgroup_mkdir+0x318/0xf50 [ 2026.472804] ? cgroup_destroy_locked+0x710/0x710 [ 2026.473918] kernfs_iop_mkdir+0x14d/0x1e0 [ 2026.474922] vfs_mkdir+0x493/0x750 [ 2026.475743] do_mkdirat+0x150/0x2b0 [ 2026.476633] ? user_path_create+0xf0/0xf0 [ 2026.477673] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2026.478970] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2026.480224] do_syscall_64+0x33/0x40 [ 2026.481144] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2026.482335] RIP: 0033:0x7f063061cb19 [ 2026.483244] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2026.487606] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2026.489195] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 2026.490674] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2026.492172] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 2026.493651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2026.495141] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 13:53:01 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x70d) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) [ 2026.573388] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' [ 2040.422195] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 2040.429105] FAULT_INJECTION: forcing a failure. [ 2040.429105] name failslab, interval 1, probability 0, space 0, times 0 [ 2040.430325] CPU: 0 PID: 58438 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 2040.430919] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2040.431650] Call Trace: [ 2040.431883] dump_stack+0x107/0x167 [ 2040.432197] should_fail.cold+0x5/0xa [ 2040.432528] ? __kernfs_new_node+0xd4/0x860 [ 2040.432903] should_failslab+0x5/0x20 [ 2040.433242] kmem_cache_alloc+0x5b/0x310 [ 2040.433302] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 2040.433597] __kernfs_new_node+0xd4/0x860 [ 2040.433611] ? mark_held_locks+0x9e/0xe0 [ 2040.433629] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2040.435399] ? cpumask_next+0x1f/0x30 [ 2040.435737] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2040.436143] ? pcpu_alloc+0x12a/0x1240 [ 2040.436497] kernfs_new_node+0x18d/0x250 [ 2040.436861] kernfs_create_dir_ns+0x49/0x160 [ 2040.437256] cgroup_mkdir+0x318/0xf50 [ 2040.437597] ? cgroup_destroy_locked+0x710/0x710 [ 2040.438022] kernfs_iop_mkdir+0x14d/0x1e0 [ 2040.438382] vfs_mkdir+0x493/0x750 [ 2040.438696] do_mkdirat+0x150/0x2b0 [ 2040.439031] ? user_path_create+0xf0/0xf0 [ 2040.439399] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2040.439854] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2040.440295] do_syscall_64+0x33/0x40 [ 2040.440622] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2040.441070] RIP: 0033:0x7f063061cb19 [ 2040.441389] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2040.442981] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2040.443636] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 2040.444248] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2040.444862] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 2040.445472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2040.446083] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 13:53:15 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 2) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:53:15 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x6a0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:53:15 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x72e) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:53:15 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 16) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:53:15 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x7bd) 13:53:15 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000400), 0x9) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) [ 2040.462047] FAULT_INJECTION: forcing a failure. [ 2040.462047] name failslab, interval 1, probability 0, space 0, times 0 [ 2040.463955] CPU: 0 PID: 58445 Comm: syz-executor.7 Not tainted 5.10.225 #1 [ 2040.464535] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2040.465233] Call Trace: [ 2040.465460] dump_stack+0x107/0x167 [ 2040.465778] should_fail.cold+0x5/0xa [ 2040.466104] ? kvmalloc_node+0x119/0x170 [ 2040.466452] should_failslab+0x5/0x20 [ 2040.466789] __kmalloc_node+0x76/0x420 [ 2040.467296] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2040.475155] ? register_lock_class+0xbb/0x17b0 [ 2040.475172] kvmalloc_node+0x119/0x170 [ 2040.475185] seq_read_iter+0x81c/0x12b0 [ 2040.475208] ? find_held_lock+0x2c/0x110 [ 2040.477282] seq_read+0x3dd/0x5b0 [ 2040.477577] ? seq_read_iter+0x12b0/0x12b0 [ 2040.477946] ? _cond_resched+0x12/0x80 [ 2040.478284] ? fsnotify_perm.part.0+0x22d/0x620 [ 2040.478682] ? seq_read_iter+0x12b0/0x12b0 [ 2040.479056] proc_reg_read+0x22a/0x300 [ 2040.479396] do_iter_read+0x4fa/0x760 [ 2040.479725] ? import_iovec+0x83/0xb0 [ 2040.480053] vfs_readv+0xe5/0x160 [ 2040.480349] ? vfs_iter_read+0xa0/0xa0 [ 2040.480682] ? __fdget_pos+0xf1/0x190 [ 2040.481006] ? lock_downgrade+0x6d0/0x6d0 [ 2040.481362] ? ksys_write+0x12d/0x260 [ 2040.481695] ? __fget_files+0x2f8/0x520 [ 2040.482056] do_readv+0x139/0x300 [ 2040.482351] ? vfs_readv+0x160/0x160 [ 2040.482670] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2040.483129] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2040.483569] do_syscall_64+0x33/0x40 [ 2040.483888] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2040.484320] RIP: 0033:0x7f7903f41b19 [ 2040.484637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2040.486198] RSP: 002b:00007f79014b7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 2040.486846] RAX: ffffffffffffffda RBX: 00007f7904054f60 RCX: 00007f7903f41b19 [ 2040.487469] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000004 [ 2040.488071] RBP: 00007f79014b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2040.488672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2040.489271] R13: 00007ffc7f98104f R14: 00007f79014b7300 R15: 0000000000022000 r1 = syz_mount_image$nfs4(&(0x7f0000000140), &(0x7f0000000600)='mnt/encrypted_dir\x00', 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000000200)="d30fd2d4d2bb01a01a547b48675368347f9d8305989bba4494ec93d5bb702e936625f2819e87f40b140867df50da1b6f20ebe370091771a83677a8f1abd35135f3c2d8f4d3da23bacd4c44af", 0x4c, 0x2ea}, {&(0x7f0000000340)="ca437151677577d421b8e4adc4fb0dbaa49808fc6d34da4e14bca5f8753fc7ba956127670e2cb302de2531793e36a708770a48b84c5357684c0d90bd15705b227b7a6438a90ce3b4b17363e0863aa056642a4b5e638dfacc490520e3c235d71221283c89b9ff2c14efba361da49fb8e7dd8f861723613ed91ba319bf703ab61f84c535146189160f65fde2cb66264e05cd04aafe0cf2fc44cf2945cd", 0x9c, 0xfffffffffffffffe}, {&(0x7f0000000800)="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", 0x1000, 0x1}], 0x8, &(0x7f0000000580)={[{'9p\x00'}, {'9p\x00'}, {}, {'net/icmp6\x00'}, {'net/icmp6\x00'}, {'9p\x00'}, {}, {'net/icmp6\x00'}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '-'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+k'}}]}) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x48080, 0x2) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x28700, 0x11) mkdirat(r2, &(0x7f0000000100)='./file3\x00', 0x88) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r3, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) openat2(0xffffffffffffffff, &(0x7f0000000000)='./file3\x00', &(0x7f00000000c0)={0x100200, 0x75, 0x8}, 0x18) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) lstat(&(0x7f0000000740)='./file2\x00', &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f00000001c0)='./file3/file0\x00', &(0x7f00000006c0)='./file2\x00', &(0x7f0000000700), 0x20, &(0x7f0000001880)={'trans=unix,', {[{@afid={'afid', 0x3d, 0x1ff}}], [{@obj_user={'obj_user', 0x3d, '$\'),()-}*'}}, {@uid_eq={'uid', 0x3d, r4}}, {@obj_type={'obj_type', 0x3d, 'defcontext'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@smackfsdef={'smackfsdef', 0x3d, 'net/icmp6\x00'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}}) 13:53:15 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000008, 0x30, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1, 0x0, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(0xffffffffffffffff, 0x40047211, &(0x7f0000000280)=0x4) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000100)=0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000440)={{}, r2, 0x0, @inherit={0x68, &(0x7f0000000340)=ANY=[@ANYBLOB="000000000000000004000000000000009e3b800000000000ff7f0000000000002200000000000000723c00000000000002000000000000000000010000000000010400000000000001000100000a000000000000000000000600000000000000ff7f000000000000"]}, @subvolid=0x2}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000003c0)={0x3, 0x1, {0xfffffffffffffffd, @usage=0x8000, 0x0, 0x0, 0x8, 0x1ff, 0xc5b, 0x400, 0x3, @usage=0x2, 0x0, 0x3, [0x43c0, 0x40, 0xc0000000, 0xfffffffffffffff8, 0x9, 0x3]}, {0x4, @struct={0xff, 0x8}, 0x0, 0x4a, 0x1, 0x7, 0x400, 0x1, 0x2, @usage=0x3ff, 0x6a1, 0x4, [0x1, 0x800, 0xfffffffffffffff9, 0xffffffff, 0x24, 0x5]}, {0x800, @struct={0x9, 0x7}, 0x0, 0x3, 0x1f, 0x2, 0x915c, 0x7, 0x8, @struct={0x5, 0xfffffffb}, 0x4, 0x8, [0x3df, 0x5, 0x8, 0x0, 0x4, 0x3]}, {0x800, 0x8, 0x8}}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000001e00)={{r1}, r2, 0xa, @inherit={0x70, &(0x7f0000000340)={0x0, 0x5, 0x200, 0x10001, {0x8, 0xfc7, 0xfff, 0x4, 0x20}, [0x62, 0x5, 0x4, 0x7f, 0x3]}}, @devid=r3}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000500)={{r0}, r2, 0x4, @inherit={0x60, &(0x7f0000000100)={0x1, 0x3, 0x5, 0xfffffffffffff001, {0x24, 0x1, 0x78d5, 0x1ff, 0x3}, [0xffffffffffffff2d, 0x46e, 0x7]}}, @subvolid=0x5}) 13:53:15 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) openat(r0, &(0x7f0000001a80)='mnt/encrypted_dir/file0\x00', 0x50200, 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000001ac0)={0x25f, 0x3, 0x3f, 0x3, 0x9, 0x7}) readv(r2, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) fcntl$dupfd(r3, 0x406, r1) r4 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000002c0)='./file2\x00', 0x74, 0x7, &(0x7f00000018c0)=[{&(0x7f0000000380)="33100bb2b0ed36b0b726bafffcfd7c54e46e9f086864d4f5ea40ad6b2017d1f98d86147a6b8102eea97d943812eff6918f8bddd859d7026b2ada69e6d89068e396ef0251adf4ccd9702d2c464b1051fd0e115fcc87e4f79c6dab9fb8a839558471d928226d061674530162a334dc8328bf89fd3cf500faf4c6e75c7f4bc0351c18a4c8327d6769a4b85df068378db8ce0f70a5c710b0bd01fe", 0x99, 0xffffffff}, {&(0x7f0000000500)="14b7520f064103bbcdbe4abf78b6cd4abcbaf9b6b3d18bb9dc48035d4c83f45131ff40aa0f0d56f193c7b914b0f17815684d3ca1e621916305d1bdfe165b5fd3bcc8ee573de91566006e51d4503efcd0900b6de6a9a75b15bf44e40716ee3faf97f48baa873e81139f359e41c0d8e4c71b9fc67a4eee978a5dd3c8e4e3bb917444a5f1", 0x83, 0x4}, {&(0x7f0000000600)="4b1633b5618269065c6c0db2f85bde5731d9d455a6e54a140d1d321f2e5fe109cba5553272e956906ac531d67fa9f1afec82ad15719aa25fe39e0d7765202327", 0x40, 0x4}, {&(0x7f00000006c0)="0fdd4eead559a1a15ec90f4f2e43718bfaec017a67a21b04dc001159f526a0d14ce94d801932f12c951d3bb1b9139656330a5afede73d277ddd026fd8c0fb6e363773e0037f6f3173f526e476928e3ed778056b34c8b0e1a8e6ddd458a93143ef12c2671a4073230ba3a36b09a7c4ee45a1865e71c4eafe9c8f78fe2b184a51e50228fef47ec5766a6c23e48f3d39b5dc64e3d05ed5027cc22b0296b3be95253b790bff9d3a84e98a9", 0xa9, 0x10000}, {&(0x7f0000000800)="d1f4d4435f8c7e633e0b514a03eb3765211551c4b80c646b43ebb60d9c69c7712f38bd50dc28448317d08d6ff09a877da393be0715d68b91ff3e88427d9c077ea076e9fc3aa8edac68d7918311a30bc4b893f8b7128b433e6dde1493509e1591e03c9452edd9b34ec0a0deba214ae5d2ef6da5420c02dc6c69f5f0e428f17e41b626f0475e3777a66e38c0ca", 0x8c, 0x280000000000000}, {&(0x7f0000000780)="8b1f1625ab6e6537d950698eb3543958964c", 0x12, 0x5}, {&(0x7f00000008c0)="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", 0x1000, 0xfb}], 0x68040, &(0x7f0000001980)={[{@uni_xlateno}, {@uni_xlateno}, {@shortname_mixed}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'iso8859-7'}}, {@nonumtail}, {@numtail}, {@uni_xlateno}], [{@mask={'mask', 0x3d, '^MAY_READ'}}]}) openat(r4, &(0x7f0000001a40)='./file2\x00', 0x2101, 0x40) [ 2040.517859] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:53:15 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0xfb, 0x1f, 0x0, 0x6, "cfdf8f7f855eac4e86749dd7bdc2ff9a", "35569fdbad59550dc00a"}, 0x1f, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r2 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x440081, 0xde0ebce66da08fd1) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r2, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x200, 0x70bd29, 0x25dfdbfc, {{}, {@void, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x16df}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x101}]]}, 0x24}, 0x1, 0x0, 0x0, 0xc0}, 0x4) syz_open_procfs(0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x4, 0x0, 0x7}) [ 2040.543078] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 13:53:15 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 17) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:53:15 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x7de) [ 2040.601585] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 2040.614846] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 13:53:15 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x200}, 0x0, 0xb, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') stat(&(0x7f0000000140)='mnt/encrypted_dir\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) mount$cgroup2(0x0, &(0x7f0000000000)='mnt/encrypted_dir\x00', &(0x7f0000000080), 0x800000, &(0x7f00000000c0)={[{}, {@memory_localevents}, {@memory_recursiveprot}], [{@subj_role={'subj_role', 0x3d, '+$'}}, {@fowner_eq={'fowner', 0x3d, r0}}]}) chdir(&(0x7f0000000300)='./file2\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) recvmsg$unix(r1, &(0x7f0000001880)={&(0x7f0000000340)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000000500)=""/184, 0xb8}, {&(0x7f00000003c0)=""/119, 0x77}, {&(0x7f00000006c0)=""/239, 0xef}, {&(0x7f0000001e00)=""/4096, 0x1000}], 0x5, &(0x7f0000001800)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}, 0x40010020) chdir(&(0x7f00000018c0)='./file2\x00') chown(&(0x7f00000002c0)='./file2\x00', r0, r2) newfstatat(0xffffffffffffff9c, &(0x7f00000001c0)='mnt/encrypted_dir\x00', &(0x7f0000000200), 0x100) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:53:15 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd=r0, 0x0, 0x0, 0x0, {0x100}, 0x1}, 0x2) readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 2040.643003] FAULT_INJECTION: forcing a failure. [ 2040.643003] name failslab, interval 1, probability 0, space 0, times 0 [ 2040.645387] CPU: 1 PID: 58768 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 2040.646575] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2040.648288] Call Trace: [ 2040.648743] dump_stack+0x107/0x167 [ 2040.649366] should_fail.cold+0x5/0xa [ 2040.650017] ? create_object.isra.0+0x3a/0xa20 [ 2040.650806] should_failslab+0x5/0x20 [ 2040.651586] kmem_cache_alloc+0x5b/0x310 [ 2040.652287] create_object.isra.0+0x3a/0xa20 [ 2040.653043] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2040.653919] kmem_cache_alloc+0x159/0x310 [ 2040.654640] __kernfs_new_node+0xd4/0x860 [ 2040.655475] ? mark_held_locks+0x9e/0xe0 [ 2040.656178] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2040.656999] ? cpumask_next+0x1f/0x30 [ 2040.657660] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2040.658464] ? pcpu_alloc+0x12a/0x1240 [ 2040.659104] kernfs_new_node+0x18d/0x250 [ 2040.659459] kernfs_create_dir_ns+0x49/0x160 [ 2040.659843] cgroup_mkdir+0x318/0xf50 [ 2040.660176] ? cgroup_destroy_locked+0x710/0x710 [ 2040.660578] kernfs_iop_mkdir+0x14d/0x1e0 [ 2040.660936] vfs_mkdir+0x493/0x750 [ 2040.661249] do_mkdirat+0x150/0x2b0 [ 2040.661566] ? user_path_create+0xf0/0xf0 [ 2040.661933] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2040.662382] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2040.662822] do_syscall_64+0x33/0x40 [ 2040.663194] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2040.663626] RIP: 0033:0x7f063061cb19 [ 2040.663944] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2040.665504] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2040.666150] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 2040.666750] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2040.667409] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 2040.668010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2040.668612] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 [ 2040.679753] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:53:15 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x730) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) [ 2040.682792] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2040.730206] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:53:15 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') rename(&(0x7f0000000000)='mnt/encrypted_dir\x00', &(0x7f0000000080)='./file0\x00') chdir(&(0x7f0000000300)='./file2\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x80) chdir(&(0x7f0000000100)='mnt/encrypted_dir\x00') readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:53:15 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 3) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) [ 2040.811594] FAULT_INJECTION: forcing a failure. [ 2040.811594] name failslab, interval 1, probability 0, space 0, times 0 [ 2040.812748] CPU: 1 PID: 59227 Comm: syz-executor.7 Not tainted 5.10.225 #1 [ 2040.813326] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2040.814018] Call Trace: [ 2040.814249] dump_stack+0x107/0x167 [ 2040.814560] should_fail.cold+0x5/0xa [ 2040.814894] ? create_object.isra.0+0x3a/0xa20 [ 2040.815305] should_failslab+0x5/0x20 [ 2040.815640] kmem_cache_alloc+0x5b/0x310 [ 2040.815996] create_object.isra.0+0x3a/0xa20 [ 2040.816377] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2040.816827] __kmalloc_node+0x1ae/0x420 [ 2040.817179] kvmalloc_node+0x119/0x170 [ 2040.817521] seq_read_iter+0x81c/0x12b0 [ 2040.817878] ? find_held_lock+0x2c/0x110 [ 2040.818230] seq_read+0x3dd/0x5b0 [ 2040.818531] ? seq_read_iter+0x12b0/0x12b0 [ 2040.818908] ? _cond_resched+0x12/0x80 [ 2040.819269] ? fsnotify_perm.part.0+0x22d/0x620 [ 2040.819675] ? seq_read_iter+0x12b0/0x12b0 [ 2040.820048] proc_reg_read+0x22a/0x300 [ 2040.820390] do_iter_read+0x4fa/0x760 [ 2040.820721] ? import_iovec+0x83/0xb0 [ 2040.821048] vfs_readv+0xe5/0x160 [ 2040.821345] ? vfs_iter_read+0xa0/0xa0 [ 2040.821676] ? __fdget_pos+0xf1/0x190 [ 2040.821999] ? lock_downgrade+0x6d0/0x6d0 [ 2040.822367] ? ksys_write+0x12d/0x260 [ 2040.822703] ? __fget_files+0x2f8/0x520 [ 2040.823078] do_readv+0x139/0x300 [ 2040.823382] ? vfs_readv+0x160/0x160 [ 2040.823714] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2040.824158] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2040.824604] do_syscall_64+0x33/0x40 [ 2040.824926] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2040.825361] RIP: 0033:0x7f7903f41b19 [ 2040.825684] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2040.827249] RSP: 002b:00007f79014b7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 2040.827900] RAX: ffffffffffffffda RBX: 00007f7904054f60 RCX: 00007f7903f41b19 [ 2040.828509] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000004 [ 2040.829114] RBP: 00007f79014b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2040.829717] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2040.830317] R13: 00007ffc7f98104f R14: 00007f79014b7300 R15: 0000000000022000 13:53:30 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 4) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:53:30 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) chown(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) 13:53:30 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x200, 0x0, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') rename(&(0x7f0000000000)='./file2\x00', &(0x7f0000000080)='./file0/file0\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') chmod(&(0x7f00000000c0)='./file2\x00', 0x4) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:53:30 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 18) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:53:30 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x6a3) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:53:30 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x7e0) 13:53:30 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x5385, 0xfffffffffffffffd) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000240)=0x20) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x31, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10040, 0x8) chdir(&(0x7f0000000300)='./file2\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffff9c, &(0x7f0000000380)='./file2\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) sync_file_range(r2, 0x0, 0x0, 0x7) 13:53:30 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x751) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) [ 2055.304780] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 2055.325763] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 2055.365189] FAULT_INJECTION: forcing a failure. [ 2055.365189] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2055.366263] CPU: 1 PID: 59510 Comm: syz-executor.7 Not tainted 5.10.225 #1 [ 2055.366852] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2055.367570] Call Trace: [ 2055.367805] dump_stack+0x107/0x167 [ 2055.368116] should_fail.cold+0x5/0xa [ 2055.368445] _copy_to_iter+0x264/0x12d0 [ 2055.368796] ? _copy_from_iter_nocache+0xd60/0xd60 [ 2055.369214] ? __virt_addr_valid+0x170/0x5d0 [ 2055.369586] ? __check_object_size+0x319/0x440 [ 2055.369977] seq_read_iter+0xdcb/0x12b0 [ 2055.370326] seq_read+0x3dd/0x5b0 [ 2055.370624] ? seq_read_iter+0x12b0/0x12b0 [ 2055.371001] ? _cond_resched+0x12/0x80 [ 2055.371351] ? fsnotify_perm.part.0+0x22d/0x620 [ 2055.371746] ? seq_read_iter+0x12b0/0x12b0 [ 2055.372104] proc_reg_read+0x22a/0x300 [ 2055.372436] do_iter_read+0x4fa/0x760 [ 2055.372762] ? import_iovec+0x83/0xb0 [ 2055.373095] vfs_readv+0xe5/0x160 [ 2055.373387] FAULT_INJECTION: forcing a failure. [ 2055.373387] name failslab, interval 1, probability 0, space 0, times 0 [ 2055.374307] ? vfs_iter_read+0xa0/0xa0 [ 2055.374642] ? __fdget_pos+0xf1/0x190 [ 2055.374970] ? lock_downgrade+0x6d0/0x6d0 [ 2055.379348] ? ksys_write+0x12d/0x260 [ 2055.379680] ? __fget_files+0x2f8/0x520 [ 2055.380031] do_readv+0x139/0x300 [ 2055.380325] ? vfs_readv+0x160/0x160 [ 2055.380646] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2055.381087] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2055.381519] do_syscall_64+0x33/0x40 [ 2055.381842] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2055.382269] RIP: 0033:0x7f7903f41b19 [ 2055.382583] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2055.384130] RSP: 002b:00007f79014b7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 2055.384777] RAX: ffffffffffffffda RBX: 00007f7904054f60 RCX: 00007f7903f41b19 [ 2055.385369] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000004 [ 2055.385973] RBP: 00007f79014b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2055.386565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2055.387174] R13: 00007ffc7f98104f R14: 00007f79014b7300 R15: 0000000000022000 [ 2055.387800] CPU: 0 PID: 59425 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 2055.388452] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2055.389164] Call Trace: [ 2055.389397] dump_stack+0x107/0x167 [ 2055.389712] should_fail.cold+0x5/0xa [ 2055.390050] ? selinux_kernfs_init_security+0x137/0x4c0 [ 2055.390506] should_failslab+0x5/0x20 [ 2055.390833] __kmalloc+0x72/0x390 [ 2055.391140] selinux_kernfs_init_security+0x137/0x4c0 [ 2055.391595] ? selinux_file_mprotect+0x610/0x610 [ 2055.392005] ? find_held_lock+0x2c/0x110 [ 2055.392367] ? __kernfs_new_node+0x2ad/0x860 [ 2055.392744] ? lock_downgrade+0x6d0/0x6d0 [ 2055.393101] ? rwlock_bug.part.0+0x90/0x90 [ 2055.393474] security_kernfs_init_security+0x4e/0xb0 [ 2055.393914] __kernfs_new_node+0x531/0x860 [ 2055.394284] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2055.394691] ? cpumask_next+0x1f/0x30 [ 2055.395019] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2055.395430] ? pcpu_alloc+0x12a/0x1240 [ 2055.395773] kernfs_new_node+0x18d/0x250 [ 2055.396122] kernfs_create_dir_ns+0x49/0x160 [ 2055.396501] cgroup_mkdir+0x318/0xf50 [ 2055.396828] ? cgroup_destroy_locked+0x710/0x710 [ 2055.397229] kernfs_iop_mkdir+0x14d/0x1e0 [ 2055.397588] vfs_mkdir+0x493/0x750 [ 2055.397890] do_mkdirat+0x150/0x2b0 [ 2055.398200] ? user_path_create+0xf0/0xf0 [ 2055.398555] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2055.398994] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2055.399455] do_syscall_64+0x33/0x40 [ 2055.399775] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2055.400203] RIP: 0033:0x7f063061cb19 [ 2055.400518] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2055.402052] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2055.402690] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 2055.403295] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2055.403899] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 2055.404497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2055.405105] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 13:53:30 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x801) 13:53:30 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x0, 0x0, 0x20, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4, r0) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) lstat(&(0x7f0000000000)='./file1\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000100)=[r2, 0x0, 0x0]) recvmsg$unix(r1, &(0x7f0000000280)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000340)=""/98, 0x62}], 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="84791057956a060c61e70dd93694e2c88fd75d71cd06974e445366c3ccae3632009a811059c226ed1ff6d3294cc391e123fadae4d56142604b6c55db9213bb0a6097f973d2d2dea82aad447f369b21d5915f7b87b5f3fab1656832d0e141f79de801249b9f2d3d9fe6cc5abb62f1a2"], 0x68}, 0x2000) r4 = getegid() lstat(&(0x7f0000000000)='./file1\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000100)=[r5, r4, r4]) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000680)=ANY=[@ANYBLOB="02000000010005000000000002000100", @ANYRES32=0xee00, @ANYBLOB="02000400", @ANYRES32, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="0400040000000000080085f7", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0xee00, @ANYBLOB="08000200", @ANYRES32=r3, @ANYBLOB="3c210000f5aa256c576b883c946a97d7e086d9448adb6c7512a9d3dd716f2c4bbeb90efcb9648599fc6f8a41ed08bd9accb5777f1c4afa", @ANYRES32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r5, @ANYBLOB="10000200000000002000040000000000"], 0x74, 0x0) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) [ 2055.486041] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' [ 2055.501818] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 2055.538737] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:53:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') open(&(0x7f0000000240)='./file1\x00', 0x200, 0x29) 13:53:30 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x47, 0x8000, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:53:30 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x753) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:53:30 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 19) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:53:30 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x6c4) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:53:30 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 5) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:53:30 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0x0, 0x0, 0xd1, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000340)='hfs\x00', 0x2a4060, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) sendmsg$inet6(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000000c0)="d0e1e0b47b9c836b70acf10bfada3e93e2ec8fe02e0675dc27ad0a5af9e6fc1b5fe84b0888a0d917d745b68471cddddba1d60b7a4f290c467c8907dd6ce9ccf6e0983ea2b106ac43a64a89e71dc0422cd9eacd426fbe0d2c3f336a75da546ac3a1c105cb6550b18fb3a7280fd18ab949d6f0a4026b6afc7dc550d93db07a39e02eb15bc28a0489a26ded93f19260383763b02fde6de53b396bf4fa838538bd9fd6a6f0299a3fd1254b09f43ab425d8e8c6255731ba39d8d68dab94836a34bd5422f8aae6b45bd6fb2d5cfa9be5696d92094ff8", 0xd3}, {&(0x7f0000000500)="5b1fbeadcf3a1f3d0f65c978dabb94a8fb566d01aa2ba682f6bf6a97c0d3c485cd625ce36a73703a791b7d4441b25ea5ee2f115528674a345be0e1c779cbf96a64671a8a222b65d2f27dc4ac0f461001ed2a495a6d7044ced4462babb4ac2493e7cd237d7e0d4c7cbd6f749201f43f45e78714d25ea0779eed1ea8899b87851d9c1749b3ab71f4f7f7d60ea179a49fe18c13c48d7736241076965e7a9806a4824abe534fdd4999692bdaf15cdf9b964b0125fed5aa9b645328324f5b362cbeae71559b3ae5030c807f2f0a8cfdf2704f0936134fc95bc5e6842af5b13903e4a4a0681ebedcc6195d50862c455bf35290ca37511461887e1b992586f3daecdd5143d820c9fc27d884503aecc4b1ea6ec030a811214cbb0dab39727c1cde9e81a21a10be3395d50632a029e8a6860a4c9cb0591bcbb21950cc032fe60e0a77513df4e3d936c280d3d371f04b789f5a52d3aeef42860035d538af64ecf0f8cdff1efda68ecff369e0cf10c24fe84581629b1204171ea24fbda3774f4011f50b819655f4c9211334258671bd00883e172408880cc33bbea64b338bdac29d82a7aa14bdb3c1cee8711c202cd67ea98321a67e99220309d44f167744ccb0fdd72ec5a3917eaf06b31684314a09ca8dfde8336bf118a0242203c44eac5919d7ce6cb17d7c49697ec5a3af2fa925ebfa7d9e549534541047cdad50d2a72677d147c75d4f0d8f882a521102b7fcc7d6e2b564f067f3b1c5b3bb8e8811bcb3eb1ba21fd0aaf99b9c0ba4d2f3cb4a0f196d4679dd53c76519b26d49fbdf1a674e3fd7414325723d05b04f1d4d0e20252890f4bed32738213fd4d1a8ea40657a404444c33dadf26c9c11c12073e59e79dcc7ac8d76fb746ba739fa99ecd78e7a590fbc09062ffd6ee78291138a36bff59482c453b06fc5664af1885e6980675384795437818870a397e56724783eb15086d2e492a9983f070d2f3f2d3ff16658813355a7b58e4bbda0821720cbd4e7b95fb2f11674ac2ba6500da62ab4714ff39266158306cf823bcb4c9616fabc25bbfb937b6d4d3e9140d6e1b4e9b426c608a0830021219f5487a3ee9167177cad9883576cde125f740b6532c6b6652be94b230d0f731362bd8eecabb7c70e0740c640e80e126ed9e00deb656769b878f53fc052712b1e7ebbe623f57986a74b6647adaa322ad10e5dc3516639cd38e734a718027cd21016ff58eb3bfbaa2d3a7b513ff12eb3846d55048ee9cdcfcbac571b95bb652d2f900b339e3c0f01cb8c007620df1909a5b688183a9a9ce2df8d66a5039ffa1591a4539e9c0d725b31da71b2cb24d4a60a3077b32a981a3d5d28a39e407fa0e3b1a73ecdd6019820fc50b3b541c7b4b842c89263db42d2d5c4432428ca55bd73adc9a1f4c76441cbb1262f507bd07e398c8fdc45778af2e14a8596e8587d3b26820af1520fbe52d109e0fc44b123a5a6a0bbc15790783da7df5b485e955a863181a4dd231218484be7af34b4d921f642de057a5db30eae7c15ba61599e0f54bf90ea22498bb0081799629ee0393df1c5c152d2cc2df1a3ca594e71dd18f5719079de9de5eea3783c8434af0b89ce666d3a03c7c50ca6ca83bbe9ee666de211fe5d7e09f21032bcc19a15bb7088dc344380f7f524e50b860ae1e5f44eb6f8205d2e18f48ec989b7eaf100b38e36f75dcd3dcac693726eb65c9c9655b1f610e81154fd9d14c5ebb88e22fba18065ed0c16de2612e607d09a85f78aca0dc4fdd1bbe7403779e66c565c0c8338b9aa8ea96ee37230ece650c2ab4c1879b4cad00800c1fd32732bdeae6b20fbd51dba3d10e4bec111ff814eeb92c370387d7707cb5a35ec7862daa898097cc614a8108771fadead4a2e30b843fdbd37a3c71aeea5fc11614046a94925a8383b765ced1a7da2fd212bf92a409abd3d5f6a3e643a5f126515d976babe59ba4606e7f53485d384f0eeea0317b55add676e80d21999417acff792b370c46ed88bfbb02e4e7bf580d83e8bf457789c75398f557bc3fa0753c13cdd181a5e912e55472da1f8e822f26b8bdc45f50256f0d125a7cc90b2ca6de33d23b1cf6e18e39617e795a325c46c7faa012bfe92ba833a7a16373bcb1a3ca6e959b02316d26611f700eaecde06767270587113824f35e972293b58a5a43a133611cdfa58acf385becb45d89e77123039b05c0b461c0b93c399169c5b20c18cfd8fe8001a6fe7e2772679452cbf0e23c74f53a4ad7d5c4ca1eedffdcefa1ec480a112937284f423ec871f979927328beda6b8d19c2b702ece23ced92840ffacef743ab87d12a49d3aa31c6209e1ffcd266d6aeef86638168f647c50bab75528cd11fc1b6000418d9b225af40fdb207f4a5546c21e408493ec554e3da33b856bfb8717a5608f35d7d86f8fb9b4c0c8a593080b0abd28ea7dc724459669799cd00970cae96d3edb258031319af71f0471ab02305899f2d4cd857e5477b52421ea889c125eba535499f5eb9f13700f9b349c0e3ebcaa21b34b0646b6e20d3c358f66ff22facb6d40359d005f33b672e205d9c9843bb0b54989db6fc255c0afcb10ce4e7548c4d43f073443ff03a972ffe79fe397b89b9f6672ad84eb7716e7a74e5a4036c0fa0989e0855b996ea73ddd91f46d8863551dd10d9ca051efa099e92fbe61d29780074c6b03ecde0ce90dffc0beeff689a410d514d6b81b242e6416eb458847128601e3fe2b377503c1b5960273fc42b55f5ebd7930623d49990bed81c091ff8fe7c679bf09484268ba4538a796f4b2573f1ecd954217d3c918c725dd7f0ac3ca63786ff164bc59cb69ee698abb0c8880434aa54aa5534acbdb71effc045e72f4c6727ecf7db3ccd06c35fd5f767df48afa2f8de4ef71ae991ac3d0d812b5299d4ed876fa78a73f9f05ffa8c06babf42451bb3e66dd699112fd23561f288b99f354944c61717013e7192c2f7511f94c0803480eba1e6b7fca1ee618e9405007ae8b01b15e739871ca7e8d5918a7cb54b91030f3fc0ac1b33e12e25013a3c267e10f49a38fd8e178f066b2ca23e01b6c18b38c9a0f051a89392cab99fd50a6f010f88cf34c3a4ffd48e43c87dd3b992df490e34e84ed0b3543fee07917a4868fb5395481aa014ffad771cb97db2878629bbb57f548e2d8226aa9baf2281cd1ac3069e3bb08395f79ddaa18944b4beaf8bb309b8ffe55e10c1482bf16379bb728e98085d7416c004759a6fcf13a514a2191354a056b25ccf1700bf2a0f8e78d2355192f0765537e2a6259e36964e11dbfe7c638563d1fbe3da919a1d0b131369461622de1bf970f0389320295012258e432e62861d1dfc5e7c80c3b17b7122357065c58e104a5bd7eefd9b91ab5f77f0cb1cf3e4db7a4297a7e06b31cbf17c9c62026506690fc6af469b1f5e72add28fd189658d27efe9a3739a032c29871566330ecf393ce53041e32ab2c9239e1e75f8bb05ffea0d126c7132f8b8ae11e725928fe1ac4d3df8779dc80db716e842ce9e5d20a611e4a533f9a705afb553cfa10e2a207c3f834c1e40c78a97bb118125a51413ff892c05483a842c103dad492fd7ebd149aba35cae5cec919c28a33de6c88473efe08a4aa49e165947db2cb50da0858ae0a0fb46834abb5449a37ed9ae56273e7c5497c274843297ec1e96ea4e7225f352abbfa788aa797822b8bbebab6d8ab08778613e1dadffb21fe9960954daba564f8df84ac9654fd099b8d3506ae5236e93cd175535799b3aa922c6a211c5a8a4538c65fe3c9807eae74876b0bed17dc65b743fa8e7cf28d07140fb6761b51ace2ba44ee12825165cfa7d492bd5e6678fbadb13ad3cf3c18c415d289e895ea8d62bd713842f045a089a331ad732b6959f216ce9493c68cbed1ef1531eb0df92e76993affc343a54d3b7ddb70a912c46f3d17c913bdfa11b711a6cb57082353dd348c33e2bd9d67e4c99e3f7402878d620b9888c56b0ee4ae43306611c393a6dcc9e800589f82baacfd6fa52a2deb96604df7ede8d6d3dd65a86cb7089acb4f462feffea8f605f35bbeca0cd3676018beef34809d068d0d66aebac743e7a3375d834ae4875a3b80dbec5b4fe3812682f5abd01dab751ca1479e02831b585cc8823d4e904fa0b6b17c1d0f73492908e393e08358859c8de2214e60a5be006c5044bd244f52fd17aef5220937689aa9017a0db4990ad6da8f8c7d86baf8e9c4babe5aff526fb9c2a9f632790d5296996429da19629bb3c1f6f9bc49bbfa739352babf83123889fd7781a6fbcd3d2e03a45101f498d437fce3d710d3ef31d4d9ffb7020c6bce31f0a63d494b87b2b794d3b2dbd55d59a9d1ccf26eabbdb1cd2b86a726df780f3f478fbf20b2b493faa966b03de733539739f215a853aba03b108e9d24462baecce34b86e05985c962eb0c8e3fc1b0522b9e47b45f999f9fd1e51d2c59aa694b82d557262838eea5b06fea755b8bee8ed03ba115599e27a0be8a7e3100ba8486df21d2e5e2d5ef1e01bbd0af4787cbb798e3e02f3e067e17314c6819bd9b7dd00f4424654dda1e5f75d81759bb4437312cdd12d0f3bb69ccb5454e6672ed3845a02ad898280bbcc0a63bfba4fb2c75a6c7527654885ee32e6ff023aa62a0784664333fa56d44b4c6e88b70b772027da1b47c8a7f96b6b1435880b0870c45e3aa578862b27fe465ac903b52fa64b4463e9d6e096b531cd46f48a22135704d0ea049ef715696a05930dd378478bdf4740cd6cb0660af35e3a0a0f3d7dc4a77e7f7973c872d9383c454b2ff7fccb5ed59e9a9de9a5d2dacb18dedb6c8411b72a36ef0938211539e0da1265f4729c5e16fd45966839a568f49b139564bb35e5ce38d108be89e84ffc9558c54ebcc28eda25b59bd877a5299dd89e95002ff9f4530c1bd8b3e9efa4adae577490b574d3d39845d1caad21f141d0603ac369ba39fcb926cadb9ff2c439febf3383bf9379098ae614172769bab26141d6ebe38f28b7b155c78cf9363fba80d375284042eba2515d347558e051303b53238d02ddcc1557ab96371ac88cd1e4ced5afabe3ba54fb985e615e03939dd4f714bfaadfab724ff0147643ce5606e6a09accbfc4fd2e8c26140e82e9f519acdc430f243fbd02dfe094d4cac5b7c7312a44545d8d1e34c1ef37a14970182b5982eb2b682d821bb8bda4f1ce3a8b45e6822c169a41778cb4d3fbc85f1bd1050dbccac076e083ef1af1ce926a44d0b22445a9f07899b92af7ac703a190f1309f04651bf20f12549b6f3ea44468d3d7624074f6df41c14f985c60043f9e389ae9accb95766401b789bb59b442d30b0dbacd75ee229126922e9cce0dc3129e53e35d7572693bb4bb1678d03426544c8aca27d0ed1e05c0be4314f93ca70d9ae113da5a9f6b41a0ac8a3559f7ada2692473788e4a928b7114f28257cc336568f19ad4923cc16dab74ebefe45d7f3debf6fa848b6ceff5d96f5deb52779bec9bc98fdd5b2d572d9dc8194df6a1e556735417835834e764467872e27a93cce3620dbfcc9254cc511eb58da3a6562d947c672f46d481ac1b371e5f59f9e3bb6f007d24a70a43f7d9f22518153cb1131c9216412e135125c5627d4ac77a2349d5d931acc338327c5101828946b74e313514b5845203e5e7a7fc6c3e444ed9017115846550f63d38fab365be88efe316923c453c100b12be3b46718ce222dd4f996354bff324c1a280ed0a203f28b7ac471167a870b2603e922857176f3558ae79ed2913b378d2edbe4af17f009f38dba25874c78a2465f6b97fd931e85104cacdb7872a77", 0x1000}, {&(0x7f0000001500)="352b3da75f3011cb60a808dc8d0dcd36f8fd43234d3056d31ae9120b18f249a5e2805584ba63210bfee843d6c630df3185e7c2ddec954b30ea6a76094abb2862c4269bf32b46ec4055b08159ad268d1207f76d6f128abc3667cd59b6a091ce2fa6d35b1e61a05d20a0d06fe72e54d53f46acdbe77a5525dfb26e2de3055e05942096907b5315c7cfa5514c4350087d0b4e354da07dc1cce633b8ca4eb304ba68bfc8b8f718946abdaa2673ed871160e14f737fb2fd4575d4d3a38d2109bd1281c77a3720a8cb49819da485991a932b4b3d129d85e743ca489d77b16c0e8ba47051e7c3c656", 0xe5}, {&(0x7f0000001600)="8250506a88aa5713af0ee24de004ded6143c412092209ac9f87008958b9d93d8d5db7154a06546560cc85ada756cf3236ab38c6552ff7609eab413bcf38157aa1fa5b33adb05114e65a0c3697df70b2ea5e0fb1e30659b21d13272f837e342ee990fdeee98944eb4d4d9191d4af77951a8474b56ebe9e8fabd7be25c53700afa215dc8dd420c81c30815304670d93b4abb6a604c435bab03dc0fc528de1b3b7c520686b03c3a466ada990872f6e6e2aa32b21119d6a5d4cf2903c2f147d4ee6062", 0xc1}], 0x4, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1e8}, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) getdents(r2, &(0x7f0000001bc0), 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000380)='ext3\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x3, &(0x7f0000001ac0)=[{&(0x7f0000001900)="54c5a940eef7dd1383ea1675daba59b3854b3aecf6e5417f2e8d861676d8dac30a940cbe92b0e55564ca976e43e6e1da170408c818e2b5c0891a2e1d718d18435d645c9723960118e535c5b8a865ba1970e4aa94d72c3234cf7ea70af8a8285f", 0x60}, {&(0x7f0000001b80)="fe2cb3f799939524b46c6dda416d63ed9ad85a0b7951d41bd0e75eacd73b222691e11086440a2360a4c99d75e7b6fef70dce6d82c1e846251e8162758ca8ed946a7e429f39c3e4b801fb103d36a63beb59aae75c65ec07b9fb7ba652dcb6790744fed8f85cafdcf3150aea15472471cd204558220994020821fa0476c5d90552cdd209afe9af", 0x86, 0x1000}, {&(0x7f0000001a40)="ad57e3b8d6881406f45d89b6aae5e1c3e3599e40631b67e084b370bec195f857e50a4ead857bee3dc221f79c34d5ef23fe7cb500ea822e2916e3f54b608fb0dee0b5edad82ff20f1d9b1736e25ccd1cdb563", 0x52, 0x9}], 0xa0020, &(0x7f0000001b40)={[], [{@dont_appraise}, {@obj_user={'obj_user', 0x3d, ' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, {@obj_role={'obj_role', 0x3d, '!'}}]}) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000001e00)={{r4}, 0x0, 0x2, @unused=[0x0, 0x7, 0x5, 0x20], @devid}) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) 13:53:30 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r2, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xfffffffffffffffb}}, './file1\x00'}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) r3 = syz_open_dev$vcsu(&(0x7f0000000080), 0x4, 0x200) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r3, 0x10e, 0x8, &(0x7f00000000c0)=0x8, 0x4) [ 2055.670920] FAULT_INJECTION: forcing a failure. [ 2055.670920] name failslab, interval 1, probability 0, space 0, times 0 [ 2055.672460] CPU: 0 PID: 60043 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 2055.673104] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2055.673848] Call Trace: [ 2055.674096] dump_stack+0x107/0x167 [ 2055.674425] should_fail.cold+0x5/0xa [ 2055.674770] ? create_object.isra.0+0x3a/0xa20 [ 2055.675207] should_failslab+0x5/0x20 [ 2055.675566] kmem_cache_alloc+0x5b/0x310 [ 2055.675955] ? stack_trace_consume_entry+0x160/0x160 [ 2055.676430] create_object.isra.0+0x3a/0xa20 [ 2055.676827] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2055.677304] kmem_cache_alloc+0x159/0x310 [ 2055.677707] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2055.678231] radix_tree_extend+0x231/0x490 [ 2055.678653] idr_get_free+0x623/0x8f0 [ 2055.679014] idr_alloc_u32+0x170/0x2d0 [ 2055.679365] ? __fprop_inc_percpu_max+0x130/0x130 [ 2055.679810] ? lock_acquire+0x197/0x470 [ 2055.680183] ? __kernfs_new_node+0xff/0x860 [ 2055.680601] idr_alloc_cyclic+0x102/0x230 [ 2055.680977] ? idr_alloc+0x130/0x130 [ 2055.681321] ? rwlock_bug.part.0+0x90/0x90 [ 2055.681703] __kernfs_new_node+0x117/0x860 [ 2055.682094] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2055.682529] ? cpumask_next+0x1f/0x30 [ 2055.682895] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2055.683326] ? pcpu_alloc+0x12a/0x1240 [ 2055.683677] kernfs_new_node+0x18d/0x250 [ 2055.684062] kernfs_create_dir_ns+0x49/0x160 [ 2055.684466] cgroup_mkdir+0x318/0xf50 [ 2055.684805] ? cgroup_destroy_locked+0x710/0x710 [ 2055.685253] kernfs_iop_mkdir+0x14d/0x1e0 [ 2055.685647] vfs_mkdir+0x493/0x750 [ 2055.685956] do_mkdirat+0x150/0x2b0 [ 2055.686298] ? user_path_create+0xf0/0xf0 [ 2055.686683] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2055.687148] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2055.687628] do_syscall_64+0x33/0x40 [ 2055.687966] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2055.688430] RIP: 0033:0x7f063061cb19 [ 2055.688757] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2055.695295] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2055.695941] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 2055.696540] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2055.697181] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 2055.697834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2055.698476] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 [ 2055.712236] FAULT_INJECTION: forcing a failure. [ 2055.712236] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2055.713143] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 2055.713426] CPU: 1 PID: 60144 Comm: syz-executor.7 Not tainted 5.10.225 #1 [ 2055.714762] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2055.715487] Call Trace: [ 2055.715965] dump_stack+0x107/0x167 [ 2055.716436] should_fail.cold+0x5/0xa [ 2055.716798] __alloc_pages_nodemask+0x182/0x600 [ 2055.717199] ? mark_held_locks+0x9e/0xe0 [ 2055.717551] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2055.718064] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2055.718533] alloc_pages_vma+0xbb/0x410 [ 2055.718901] handle_mm_fault+0x152f/0x3500 [ 2055.719276] ? __schedule+0x82c/0x1ea0 [ 2055.719608] ? __pmd_alloc+0x5e0/0x5e0 [ 2055.719946] ? vmacache_find+0x55/0x2a0 [ 2055.720283] ? vmacache_update+0xce/0x140 [ 2055.720645] do_user_addr_fault+0x56e/0xc60 [ 2055.721019] exc_page_fault+0xa2/0x1a0 [ 2055.721351] asm_exc_page_fault+0x1e/0x30 [ 2055.721711] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 2055.722168] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca e9 e3 db 1d 02 0f 1f 00 0f 01 [ 2055.723718] RSP: 0018:ffff88804f9bf8c8 EFLAGS: 00050206 [ 2055.724172] RAX: 0000000000000001 RBX: 0000000000000bb5 RCX: 000000000000000e [ 2055.724772] RDX: 0000000000000005 RSI: ffff88800eb56b40 RDI: 0000000020001000 [ 2055.725372] RBP: 00000000200004c0 R08: 0000000000000000 R09: ffff88800eb56bb4 [ 2055.725973] R10: ffffed1001d6ad76 R11: 0000000000000001 R12: ffff88800eb56000 [ 2055.726573] R13: 0000000020001075 R14: 00007ffffffff000 R15: 0000000000000000 [ 2055.727212] copyout.part.0+0x10b/0x140 [ 2055.727554] _copy_to_iter+0x293/0x12d0 [ 2055.727907] ? _copy_from_iter_nocache+0xd60/0xd60 [ 2055.728329] ? __virt_addr_valid+0x170/0x5d0 [ 2055.728707] ? __check_object_size+0x319/0x440 [ 2055.729100] seq_read_iter+0xdcb/0x12b0 [ 2055.729454] seq_read+0x3dd/0x5b0 [ 2055.729750] ? seq_read_iter+0x12b0/0x12b0 [ 2055.730120] ? _cond_resched+0x12/0x80 [ 2055.730460] ? fsnotify_perm.part.0+0x22d/0x620 [ 2055.730858] ? seq_read_iter+0x12b0/0x12b0 [ 2055.731230] proc_reg_read+0x22a/0x300 [ 2055.731566] do_iter_read+0x4fa/0x760 [ 2055.731893] ? import_iovec+0x83/0xb0 [ 2055.732224] vfs_readv+0xe5/0x160 [ 2055.732521] ? vfs_iter_read+0xa0/0xa0 [ 2055.732853] ? __fdget_pos+0xf1/0x190 [ 2055.733178] ? lock_downgrade+0x6d0/0x6d0 [ 2055.733539] ? ksys_write+0x12d/0x260 [ 2055.733868] ? __fget_files+0x2f8/0x520 [ 2055.734220] do_readv+0x139/0x300 [ 2055.734520] ? vfs_readv+0x160/0x160 [ 2055.734840] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2055.735287] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2055.735729] do_syscall_64+0x33/0x40 [ 2055.736045] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2055.736337] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' [ 2055.736477] RIP: 0033:0x7f7903f41b19 [ 2055.736489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2055.736502] RSP: 002b:00007f79014b7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 2055.739524] RAX: ffffffffffffffda RBX: 00007f7904054f60 RCX: 00007f7903f41b19 [ 2055.740132] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000004 [ 2055.740744] RBP: 00007f79014b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2055.741341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2055.741942] R13: 00007ffc7f98104f R14: 00007f79014b7300 R15: 0000000000022000 [ 2055.773035] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2055.778864] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 2055.795252] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 13:53:45 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x803) 13:53:45 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000080)="6cc936d7c962fd9a8f645c1dab543d682682a92bfcb6ead0ab7e08078fc1ed4c12ee7d59a325b6dd4679c66b9877b7a8873434cb9229f70ed3f1accbe1d5859a2d3f70f7162b2caea602e8795d863992baa1ecac36adb5bc1673d82ba111a5fe45872fa1cbc9988d919078d18155c2c93bc76b3d2b76d352322f2233cdb9e17b4bb4c6eaff806e82e110a685f2fb56728a9e0e642709a86ea34197d44a1de6a790df", 0xa2) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r1 = getpgrp(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/icmp6\x00') readv(r2, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:53:45 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:53:45 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x774) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:53:45 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 20) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:53:45 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x2000000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES16=r0, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x1, 0x9, &(0x7f0000001980)=[{&(0x7f0000000500)="c9b5128c47046bc2a410b2a07bf15d013d84dd3c8979898a85f75e69690af808589ca3c7a5d329cad013a39a12c65d02836401be8c9492757a95f88a8bcd8e049e85fbc4ef6561a050c3c742f2d051da55af06ba1d1d1037b22e4fa9413f1aa4219a3698a4878a4c3f00f5f805f9683d25ea1159a72deedd0206ff651f668a1cd04877a7d827db441589788f67df4caea0fc8f0aca7a0e3245ab64a420e3354c73f1de10815f42bdf79b9b0a2800580e7cb03cf258dcf38a93a33f48bbe0b7ad422224f55564214f04cf60c2111524d7da1aaafef33d90b0f6c628d4ccf1d3283b41cf1e70ac4ba4338eb7543455", 0xee, 0xffffffffffffff80}, {&(0x7f0000000600)="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", 0x1000, 0xfffffffffffffff9}, {&(0x7f0000001600)="195eae0437c94967cb4d46f78782e4ccc50f5bc48f1891a99ea42d1f80c10f3ec10b643292d699f649106b9e3adea720464adcd6b5c0745525691bc0526fc6d68d3c1500daa309def64b4932e770dd7e9d693ef80ec0ae419fda00f8a7e540bd984d39327ccfdbe67ee322513e1872d394e4122b7ce75549c655eeb4aa3e8235b8b699c30105882a972d162be18b4da197e2bfd96c841559da7dd2b10ff8c1e52730e5b4e95f522684c46d3d", 0xac, 0x1}, {&(0x7f0000000340)="0591e336ce811044e7298c430116fc338ee5db843b86bc0ddaba17611fae08aa2f156dee9043735cc614e523011856922ea7308cf2c931035d96bfa12390cc27bc78cbcc6ccc1b7bc5fd48b53bcfb5aa24d6b0c075ee10", 0x57, 0x5}, {&(0x7f00000016c0)="554445500fc46bba2b278dcf4d20bc6068c65fa3491220970cb4ae8c687250267ca6bfbf8a32bbb3aeefd2e758dc10925fcbcbfacac055f0aae601f7c912d48b6a61ea7f1b140655347a9e8e9af2753e022ee5cad22d9ebc1080e0292aef0e162c524f7d8724300ae69bc24b5828f57abd010c91fb25dc522c7d8e1361159009a66dd425194148bd618d974f3639786e3bec0f00885df8b9ff7aac29a6d287f73d97e10b489c1239dee831b64ac3ec18cbf2a91aca70166a5c82210649451a97eb8e91d6ac0fccf6083965c19085", 0xce, 0x20}, {&(0x7f00000017c0)="5517f08592e309f1b20274821b653f61ba9ea8a9a32c11f9428d57547f133465a650fd37cdf19209ec249424dec300371528c306a51c38416e1743ab300c251d02396783baa461fc687f23774b86d541fd3906a6f3ff6e614109ae34321a208c8ddc6ad9ba630394b7f22b24baf6de1c59a88e6d0376762b333a6e98b4c983df539b2b02207266b78599c7befd5b7ccb43ea3001a13968b1197a5ee426167e6d407684d6a0f2786e405794b6cd05514a466dedcffeda38a2cc1ea648772ef83793079375072db5d7e1ad34facfaecafdd2baf82292", 0xd5, 0xd0ef}, {&(0x7f0000001e00)="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", 0x1000, 0x80000000}, {&(0x7f0000000280), 0x0, 0x75e}, {&(0x7f00000018c0)="e89fac0d24035d9cb772c029a1b987e593279c3f35fd79523b8178921db577d3085a6fb8d6d36f190154837900674ad3bc18345ae5accc86cc3ad8ee7b43f80849c521780a13cb37783348cb97e1987fbe6164a25b5747870e991e031d6dbbe71b2859820e5c90289a6f14f2fbf96f15914eacc3102b47233ef05b66e8b1e72788ec4052b05d", 0x86, 0x7fffffff}], 0x480000, &(0x7f0000001a80)={[{@uni_xlateno}, {@rodir}, {@shortname_winnt}, {@uni_xlate}, {@uni_xlateno}, {@uni_xlate}, {@shortname_lower}, {@shortname_winnt}], [{@func={'func', 0x3d, 'BPRM_CHECK'}}, {@hash}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0xd, 0x39, 0x66, 0x34, 0x30, 0x63, 0x2b], 0x2d, [0x33, 0x35, 0x63, 0x65], 0x2d, [0x37, 0x35, 0x64, 0x66], 0x2d, [0x63, 0x39, 0x1, 0x63], 0x2d, [0x62, 0x0, 0x63, 0x33, 0x35, 0x35, 0x36, 0x61]}}}, {@appraise}, {@smackfstransmute={'smackfstransmute', 0x3d, 'pipefs\x00'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) 13:53:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mkdirat(r0, &(0x7f00000002c0)='./file0\x00', 0x100) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:53:45 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x6c7) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) [ 2070.306660] FAULT_INJECTION: forcing a failure. [ 2070.306660] name failslab, interval 1, probability 0, space 0, times 0 [ 2070.308782] CPU: 1 PID: 60587 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 2070.309943] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2070.311538] Call Trace: [ 2070.312136] dump_stack+0x107/0x167 [ 2070.313030] should_fail.cold+0x5/0xa [ 2070.313928] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2070.315138] should_failslab+0x5/0x20 [ 2070.316003] kmem_cache_alloc+0x5b/0x310 [ 2070.316703] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2070.317464] idr_get_free+0x4b5/0x8f0 [ 2070.318224] idr_alloc_u32+0x170/0x2d0 [ 2070.318957] ? __fprop_inc_percpu_max+0x130/0x130 [ 2070.319473] ? lock_acquire+0x197/0x470 [ 2070.320214] ? __kernfs_new_node+0xff/0x860 [ 2070.320635] idr_alloc_cyclic+0x102/0x230 [ 2070.321079] ? idr_alloc+0x130/0x130 [ 2070.321796] ? rwlock_bug.part.0+0x90/0x90 [ 2070.322795] __kernfs_new_node+0x117/0x860 [ 2070.323299] ? mark_held_locks+0x9e/0xe0 [ 2070.324249] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2070.324846] ? cpumask_next+0x1f/0x30 [ 2070.325312] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2070.325981] ? pcpu_alloc+0x12a/0x1240 [ 2070.326327] kernfs_new_node+0x18d/0x250 [ 2070.327247] kernfs_create_dir_ns+0x49/0x160 [ 2070.328158] cgroup_mkdir+0x318/0xf50 [ 2070.329066] ? cgroup_destroy_locked+0x710/0x710 [ 2070.329594] kernfs_iop_mkdir+0x14d/0x1e0 [ 2070.330579] vfs_mkdir+0x493/0x750 [ 2070.330978] do_mkdirat+0x150/0x2b0 [ 2070.331041] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777' [ 2070.331847] ? user_path_create+0xf0/0xf0 [ 2070.333857] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2070.335038] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2070.336232] do_syscall_64+0x33/0x40 [ 2070.337087] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2070.338270] RIP: 0033:0x7f063061cb19 [ 2070.339115] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2070.343388] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2070.345165] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 2070.346809] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2070.348132] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 2070.348354] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' [ 2070.349788] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2070.349796] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 13:53:45 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x6e8) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:53:45 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='mnt/encrypted_dir\x00', &(0x7f0000000080), 0x6000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r0, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r1}}, './file0\x00'}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r2, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 2070.557146] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777' [ 2084.962842] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:54:00 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r1, 0x0) r2 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {r0}}, './file0\x00'}) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r3, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:54:00 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) pwrite64(r0, &(0x7f00000000c0)="cecbba4d1b512abc239225b694fe0d88993ad84fc22a7b5537f4656dc312538cd3e0ca997789181bb3c63cdc762b398f", 0x30, 0x8001) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) 13:54:00 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xbb5}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:54:00 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x824) 13:54:00 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x777) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:54:00 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x6ea) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:54:00 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 21) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:54:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110ebb03030302c00d47750b317ed1bb1fc27d65cc63c602a2cec266b4bbc093a24398522a184f8fb3b93de60ae69fac0195fa9ea1426b148fe4ea15cb5f87380af0adf9b145d1a1c7e425a99248d51f5f1d86379c5f476bbb2711c777acfcf6de626c56ea12de6fdc68e14937a79191d3f93d258c2e93a78354f25efb0d8c200626e2e15418af1fc4a76c1d5f61bd3c15a649cc00bd27912bb82f0a77f513fcb4fe1dc21ad1a8c2d3d65979243918f61f160bed1ce056c1e70f48000ed26562ce3231d5ca165db64dea8db58f9a80a24104b6700000000"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 2084.988553] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 2085.038159] FAULT_INJECTION: forcing a failure. [ 2085.038159] name failslab, interval 1, probability 0, space 0, times 0 [ 2085.039418] CPU: 0 PID: 61322 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 2085.040024] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2085.040718] Call Trace: [ 2085.040951] dump_stack+0x107/0x167 [ 2085.041268] should_fail.cold+0x5/0xa [ 2085.041599] ? create_object.isra.0+0x3a/0xa20 [ 2085.041992] should_failslab+0x5/0x20 [ 2085.042320] kmem_cache_alloc+0x5b/0x310 [ 2085.042675] create_object.isra.0+0x3a/0xa20 [ 2085.043050] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2085.043488] kmem_cache_alloc+0x159/0x310 [ 2085.043869] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2085.044351] idr_get_free+0x4b5/0x8f0 [ 2085.044692] idr_alloc_u32+0x170/0x2d0 [ 2085.045030] ? __fprop_inc_percpu_max+0x130/0x130 [ 2085.045446] ? lock_acquire+0x197/0x470 [ 2085.045789] ? __kernfs_new_node+0xff/0x860 [ 2085.046165] idr_alloc_cyclic+0x102/0x230 [ 2085.046522] ? idr_alloc+0x130/0x130 [ 2085.046842] ? rwlock_bug.part.0+0x90/0x90 [ 2085.047214] __kernfs_new_node+0x117/0x860 [ 2085.047591] ? mark_held_locks+0x9e/0xe0 [ 2085.047940] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2085.048345] ? cpumask_next+0x1f/0x30 [ 2085.048673] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2085.049075] ? pcpu_alloc+0x12a/0x1240 [ 2085.049417] kernfs_new_node+0x18d/0x250 [ 2085.049771] kernfs_create_dir_ns+0x49/0x160 [ 2085.050152] cgroup_mkdir+0x318/0xf50 [ 2085.050482] ? cgroup_destroy_locked+0x710/0x710 [ 2085.050890] kernfs_iop_mkdir+0x14d/0x1e0 [ 2085.051248] vfs_mkdir+0x493/0x750 [ 2085.051567] do_mkdirat+0x150/0x2b0 [ 2085.051888] ? user_path_create+0xf0/0xf0 [ 2085.052247] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2085.052693] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2085.053133] do_syscall_64+0x33/0x40 [ 2085.053453] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2085.053889] RIP: 0033:0x7f063061cb19 [ 2085.054208] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2085.055764] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2085.056412] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 2085.057014] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2085.057617] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 2085.058219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2085.058821] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 [ 2085.099522] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:54:00 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x826) 13:54:00 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="240000006d00210c000000000000000000020200fb97c1b8b32feaeee2b6dfe610000000"], 0x24}}, 0x0) sendto(r0, &(0x7f00000000c0)="b31ba14cb32d00e9e8326ee46f2db3fe7753fadd53547174ea4b444d29d72d6f8251f9af4afc46ec43b1341b213c0f01a9f0d04d4a880efcd46c5507d4acbb1418dad5458d44f447aa6f36aef880cb9865723f438edf11d04005847418d5a07a738190b1d4b242c2488877f62b108ec902f8cd56a64b1d224e94de4d98205a5c3299a6c4261036ffe5c13ae49af48e883b71a59fbec0435211f3d5b4cd51ac50d312b4d9d1191c9b9c92099f54cb80a0d919866402aae4975d8f6707dac5a028f735af102abfd68cfc6c222a2cddd9c0780626c9345dae521832f1c0fcbf0f1f3208daca0415570ab5a711af", 0xec, 0x20000000, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000340)=0xc) r2 = syz_io_uring_complete(0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000700)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) setresuid(r1, r3, r4) 13:54:00 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 22) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) [ 2085.189009] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:54:00 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x798) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:54:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:54:00 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x70b) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) [ 2085.195897] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 13:54:00 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x200014b9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) [ 2085.235380] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2085.246432] FAULT_INJECTION: forcing a failure. [ 2085.246432] name failslab, interval 1, probability 0, space 0, times 0 [ 2085.247878] CPU: 0 PID: 61837 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 2085.248461] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2085.249189] Call Trace: [ 2085.249420] dump_stack+0x107/0x167 [ 2085.249774] should_fail.cold+0x5/0xa [ 2085.250103] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2085.250591] should_failslab+0x5/0x20 [ 2085.250959] kmem_cache_alloc+0x5b/0x310 [ 2085.251313] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2085.251873] idr_get_free+0x4b5/0x8f0 [ 2085.252210] idr_alloc_u32+0x170/0x2d0 [ 2085.252544] ? __fprop_inc_percpu_max+0x130/0x130 [ 2085.253001] ? lock_acquire+0x197/0x470 [ 2085.253341] ? __kernfs_new_node+0xff/0x860 [ 2085.253749] idr_alloc_cyclic+0x102/0x230 [ 2085.254111] ? idr_alloc+0x130/0x130 [ 2085.254426] ? rwlock_bug.part.0+0x90/0x90 [ 2085.254840] __kernfs_new_node+0x117/0x860 [ 2085.255196] ? mark_held_locks+0x9e/0xe0 [ 2085.255558] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2085.256034] ? cpumask_next+0x1f/0x30 [ 2085.256359] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2085.256803] ? pcpu_alloc+0x12a/0x1240 [ 2085.257143] kernfs_new_node+0x18d/0x250 [ 2085.257494] kernfs_create_dir_ns+0x49/0x160 [ 2085.257918] cgroup_mkdir+0x318/0xf50 [ 2085.258245] ? cgroup_destroy_locked+0x710/0x710 [ 2085.258647] kernfs_iop_mkdir+0x14d/0x1e0 [ 2085.259048] vfs_mkdir+0x493/0x750 [ 2085.259355] do_mkdirat+0x150/0x2b0 [ 2085.259682] ? user_path_create+0xf0/0xf0 [ 2085.260106] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2085.260549] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2085.261028] do_syscall_64+0x33/0x40 [ 2085.261345] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2085.261820] RIP: 0033:0x7f063061cb19 [ 2085.262135] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2085.263781] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2085.264422] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 2085.265060] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2085.265656] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 2085.266292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2085.266930] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 13:54:00 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x1, 0x0, 0x1, 0x7, 0x6, @multicast}, 0x14) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) [ 2085.367037] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' [ 2085.396474] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:54:00 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') r1 = gettid() perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x70, 0xbd, 0x9, 0x0, 0x0, 0x10000, 0x640, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x401, 0x40}, 0x840, 0x2, 0x0, 0x4, 0x2, 0xfff, 0x8, 0x0, 0x1ff, 0x0, 0x10000}, r1, 0x2, r0, 0x2) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmstat\x00', 0x0, 0x0) preadv(r2, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 13:54:00 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x847) [ 2085.413901] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:54:14 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x7ffff000}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:54:14 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x81) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x49) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) 13:54:14 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x849) 13:54:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f00000002c0)='mnt/encrypted_dir\x00', 0x1, 0x6, &(0x7f00000008c0)=[{&(0x7f0000000380)="c0b26c1f8874af8f80a5b59cbf801c3fd5f02c7f8e835da54041ab4ae11a875cd1537763940f6055fd22f888d8a73bf5bad8ab2cad89f64751703b5c6dc61bdd76c50a4ca200951b0207807001de8df1f0758411fd9335d19f78537aade06e8145ea5d8ab34026a951feb475512aa29a2950f898ac00ac09bc5022d06062883dbdf1b28601bf0039d24e574845558e70151c091b09681b461358646fa09f7919ebda655e87bc1ab361cdcaab3049", 0xae, 0x9}, {&(0x7f0000000500)="5c42b21298d2c7350dfe8465e49b0bc8946519b9dd154a9e3993c23794cefdd360f23c02e94f4b598392488194892f25a40703a5d140c4d89385", 0x3a, 0x763}, {&(0x7f0000000540)="1eca50161d47ba703c7cc46fa236d981c30633f4702abf8c423284b3c451eb0c015e5aec7e629041b4f40cf362fa67de744cd7a10cef5db8988fd787cd9483f7821bf4c46b859ba323d26b450d33e15b7821835bbb6878926e398afcadc230305f219def443927157ec77a02d6f7ae9793ef0f2d1e07fc622640c03cc5bb7f97c65cddde66f2e59ab13c57d669b74934e93d493cab1e91776fb60a661d367a09a1bc3e6e0bc3309efc19cfaa1ef295bf2d76a40273f73c0225529baeacabca8c23ce2d1a5e5feb105e8c8545fc3138cde6592c2cd1", 0xd5}, {&(0x7f00000006c0)="34b0bb08294cca5d3f1dc0eec0a1c7108fe2e3e3813b8f16a8656e6a2eaf155c620a9e95e863d026caf343bfdad52b3df82fc20fc345207df941641711a258294d4b11327b6b105705bb914b09b5263f6134c246135c81f64353500b72414a", 0x5f, 0x2}, {&(0x7f0000000800)="9acafd3d81d14382e4aa95e6b95528f121fd342702a7584f0b1349a539d3cffe6e4a6e69292aff8dc1ffab3c42d5e5fbe11e0c830e1741fd55fd607b37f042ded029b47ad94fd989d4cf9c1bb9a28f4f3484195bacbd46ddeae1cdb009b96f46aa105789945682bb580afb3939828912bd1cfcfcb4a5230d1763dff0920e12a7238471f43c2760af05dbd556fdc941982057bcf9893c09f63985f205ee", 0x9d, 0x694}, {&(0x7f0000000a00)="6bbc5f6e820a60729220ebb032dcf7dbab2f2cd5f63b48f0db2f90c25049d08c36d277166b6c6094931ad05061d4f9aa10877faa415ae18a7a2e7c7da748b31d6bec8e6704ef47c50a49ebc7f3261a078987319d37ab965eb605888cd4e594a166ef4e01667a", 0x66, 0x9}], 0x1000021, &(0x7f0000000980)={[{@huge_always}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '=static', @val={0x3a, [0x33, 0x33, 0x31]}}}}], [{@appraise}, {@dont_measure}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c706f72743d307830306532342c74696d658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_JOIN_OCB(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)={0x24, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x6}]}, 0x24}}, 0x0) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 13:54:14 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x79a) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:54:14 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 23) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:54:14 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x70d) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:54:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='./file1\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x3244020, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') unlinkat(r0, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x200) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 2099.403810] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 2099.413797] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 2099.422404] FAULT_INJECTION: forcing a failure. [ 2099.422404] name failslab, interval 1, probability 0, space 0, times 0 [ 2099.423753] CPU: 0 PID: 62492 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 2099.424371] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2099.425097] Call Trace: [ 2099.425353] dump_stack+0x107/0x167 [ 2099.425694] should_fail.cold+0x5/0xa [ 2099.426040] ? create_object.isra.0+0x3a/0xa20 [ 2099.426434] should_failslab+0x5/0x20 [ 2099.426763] kmem_cache_alloc+0x5b/0x310 [ 2099.427111] ? mark_held_locks+0x9e/0xe0 [ 2099.427463] create_object.isra.0+0x3a/0xa20 [ 2099.431866] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2099.432300] kmem_cache_alloc+0x159/0x310 [ 2099.432664] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2099.433141] idr_get_free+0x4b5/0x8f0 [ 2099.433480] idr_alloc_u32+0x170/0x2d0 [ 2099.433817] ? __fprop_inc_percpu_max+0x130/0x130 [ 2099.434231] ? lock_acquire+0x197/0x470 [ 2099.434571] ? __kernfs_new_node+0xff/0x860 [ 2099.434945] idr_alloc_cyclic+0x102/0x230 [ 2099.435298] ? idr_alloc+0x130/0x130 [ 2099.435616] ? rwlock_bug.part.0+0x90/0x90 [ 2099.436003] __kernfs_new_node+0x117/0x860 [ 2099.436361] ? mark_held_locks+0x9e/0xe0 [ 2099.436708] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2099.437117] ? cpumask_next+0x1f/0x30 [ 2099.437444] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2099.437844] ? pcpu_alloc+0x12a/0x1240 [ 2099.438184] kernfs_new_node+0x18d/0x250 [ 2099.438537] kernfs_create_dir_ns+0x49/0x160 [ 2099.438925] cgroup_mkdir+0x318/0xf50 [ 2099.439253] ? cgroup_destroy_locked+0x710/0x710 [ 2099.439657] kernfs_iop_mkdir+0x14d/0x1e0 [ 2099.440037] vfs_mkdir+0x493/0x750 [ 2099.440345] do_mkdirat+0x150/0x2b0 [ 2099.440658] ? user_path_create+0xf0/0xf0 [ 2099.441015] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2099.441459] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2099.441898] do_syscall_64+0x33/0x40 [ 2099.442215] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2099.442649] RIP: 0033:0x7f063061cb19 [ 2099.442965] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2099.444527] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2099.445172] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 2099.445772] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2099.446373] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 2099.446975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2099.447577] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 13:54:14 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000640)='./file0\x00', 0x92e02, 0x100) r2 = dup(r0) linkat(r1, &(0x7f0000000680)='./file0\x00', r2, &(0x7f00000006c0)='./file0\x00', 0x2000) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000280)={@initdev, @empty}, &(0x7f0000000740)=0xc) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, &(0x7f00000003c0)=0x0, &(0x7f0000000400)) syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x5, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000500)="2e084e3760f5a6bdc4ed56ea1e5b6584a3872bcd304dfd93d11c9263f790b582c6a4c347e72c3dde84d997b1581721dd112684fdf7c238686318b5d5c5fbc227d9ff18e494453bcff128a8e6ea8066225bafe749633b4145f00570940641a1c90367e72ffa4a244ca9324a2094dd4225c2b3af3093cf7dcf32510e13d4d2eecb11003fcef276903f6518636b2c3bec8a820e0a6d81ef844220c766a859e8f068f45bbfc3d449136b6d34565beb141c0a6c92421103cb429f1f2179a39c3d", 0xbe, 0x101}, {&(0x7f0000000140)="3007ecffef726b2fea8f6f666ca1e7825fa97ae73ad66d29c70d3f7a5636ab25ee1edee3f2c5b789eb0fb0c70782dc07aaa74afcf1631f8fdfa88939a10ca4b3a4c460bacc343c7ef9b9b76ff018ea80", 0x50, 0x8}, {&(0x7f0000000200)="21522e7d497d7ec472b4371aa4904bc7a99f5881689c65ff6ccd396c447ecc20832594e335b3f743406e495afd17c0c0a4ce1c", 0x33, 0x5}, {&(0x7f0000000340)="ab30bda350322392fea6383e9aad2b11f0395c0287bda64346a9b05df9c87dff400718cbdef8fa47b3a5fb55ffb34ee1e3192f832a3f0e1d8c4153c33220144d48d27ecfc7858621112c2a969c1bbb9deb4475408612685585226442b73b07cc4aa654ce9ddcd6181878b4dfc8a82207ffd690064713fcf48e", 0x79, 0x89}, {&(0x7f0000000440)="ea27ab2c6f99abda13f53dc76d0ca967d75f5995b4dbcffa3fa73feb5206e7fbb12f8be4cde4a55c7e139645131322bcc1026ac99c88f4ccd36f188cd35f69a5e4525df13e7b8165b7b0d1", 0x4b, 0x8}], 0x2800480, &(0x7f00000007c0)=ANY=[@ANYBLOB='hide,gid=', @ANYRESHEX=0x0, @ANYBLOB=',block=0x0000000000000800,hide,norock,hide,utf8,mode=0x0000000080000000,map=acorn,obj_role=.&m{,audit,obj_user=tmpfs\x00,uid>', @ANYRESDEC=r4, @ANYBLOB=',func=POLICY_CHECK,smackfstransmute=cgroup2\x00,uid=', @ANYRESDEC, @ANYBLOB="47ae0ef4ce0b91fb98607f2398b7166397b7f1a7b54894e4c2098ed3101030474afda8368ebe13f05357bf3b3d579c43a8ee3976e76e81ded8e533359c5f5d40cc9dcbd4ebc38f9068bcda4b699557bd8ddcceebe7d2589854c3d3519743f19626decc86619de2892691d7e66a2ea7b2c06e15ee011c9ff1516464a2abe859c67cf93dd247654907a3f338b682a490c16676"]) [ 2099.470083] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:54:14 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x86a) [ 2099.588071] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:54:14 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x7bb) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:54:14 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x2) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:54:14 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x72e) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:54:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000005c0)={0x0, &(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f00000001c0), {0x10}, &(0x7f0000000340)=""/222, 0xde, &(0x7f0000000500)=""/162, &(0x7f0000000200)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x6}, 0x58) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x8, 0x0, 0x9e, 0x4, 0x0, 0x2, 0x40c00, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x2, 0x4, 0x7eb5, 0x2, 0x41e, 0x4, 0x0, 0x0, 0x4, 0x0, 0x80000001}, r0, 0xe, 0xffffffffffffffff, 0x1) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 2099.698207] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' 13:54:14 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 24) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:54:14 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file2\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472613d307830308432342c69696f658110eb303030302c00"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='./file2\x00') perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x8, 0x81, 0xf0, 0x3a, 0x0, 0xfffffffffffffffa, 0x21000, 0x5, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000240), 0x8}, 0x204, 0x8, 0x3, 0x9, 0x4, 0x40, 0x4cd, 0x0, 0x4, 0x0, 0x401}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$FIONREAD(r2, 0x541b, &(0x7f00000002c0)) 13:54:14 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x86c) [ 2099.797941] FAULT_INJECTION: forcing a failure. [ 2099.797941] name failslab, interval 1, probability 0, space 0, times 0 [ 2099.799160] CPU: 0 PID: 63244 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 2099.799771] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2099.800467] Call Trace: [ 2099.800700] dump_stack+0x107/0x167 [ 2099.801014] should_fail.cold+0x5/0xa [ 2099.801345] ? selinux_kernfs_init_security+0x137/0x4c0 [ 2099.801806] should_failslab+0x5/0x20 [ 2099.802135] __kmalloc+0x72/0x390 [ 2099.802444] selinux_kernfs_init_security+0x137/0x4c0 [ 2099.802887] ? selinux_file_mprotect+0x610/0x610 [ 2099.803299] ? find_held_lock+0x2c/0x110 [ 2099.803655] ? __kernfs_new_node+0x2ad/0x860 [ 2099.804070] ? lock_downgrade+0x6d0/0x6d0 [ 2099.804452] ? rwlock_bug.part.0+0x90/0x90 [ 2099.804847] security_kernfs_init_security+0x4e/0xb0 [ 2099.805313] __kernfs_new_node+0x531/0x860 [ 2099.805712] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2099.806149] ? cpumask_next+0x1f/0x30 [ 2099.806503] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2099.806939] ? pcpu_alloc+0x12a/0x1240 [ 2099.807310] kernfs_new_node+0x18d/0x250 [ 2099.807694] kernfs_create_dir_ns+0x49/0x160 [ 2099.808103] cgroup_mkdir+0x318/0xf50 [ 2099.808463] ? cgroup_destroy_locked+0x710/0x710 [ 2099.808896] kernfs_iop_mkdir+0x14d/0x1e0 [ 2099.809276] vfs_mkdir+0x493/0x750 [ 2099.809601] do_mkdirat+0x150/0x2b0 [ 2099.809938] ? user_path_create+0xf0/0xf0 [ 2099.810316] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2099.810796] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2099.811267] do_syscall_64+0x33/0x40 [ 2099.811604] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2099.812073] RIP: 0033:0x7f063061cb19 [ 2099.812411] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2099.814066] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2099.814765] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 2099.815409] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2099.816061] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 2099.816702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2099.817339] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 [ 2099.876883] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:54:28 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x7bd) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:54:28 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x730) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) [ 2113.806203] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 2113.810779] FAULT_INJECTION: forcing a failure. [ 2113.810779] name failslab, interval 1, probability 0, space 0, times 0 [ 2113.827856] CPU: 0 PID: 63651 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 2113.828491] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2113.829233] Call Trace: [ 2113.829481] dump_stack+0x107/0x167 [ 2113.829819] should_fail.cold+0x5/0xa [ 2113.830173] ? create_object.isra.0+0x3a/0xa20 [ 2113.830595] should_failslab+0x5/0x20 [ 2113.830949] kmem_cache_alloc+0x5b/0x310 [ 2113.831325] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2113.831769] create_object.isra.0+0x3a/0xa20 [ 2113.832185] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2113.832652] __kmalloc+0x16e/0x390 [ 2113.832994] selinux_kernfs_init_security+0x137/0x4c0 [ 2113.833464] ? selinux_file_mprotect+0x610/0x610 [ 2113.833899] ? find_held_lock+0x2c/0x110 [ 2113.834282] ? __kernfs_new_node+0x2ad/0x860 [ 2113.834686] ? lock_downgrade+0x6d0/0x6d0 [ 2113.835071] ? rwlock_bug.part.0+0x90/0x90 [ 2113.835470] security_kernfs_init_security+0x4e/0xb0 [ 2113.835950] __kernfs_new_node+0x531/0x860 [ 2113.836345] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2113.836784] ? cpumask_next+0x1f/0x30 [ 2113.837136] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2113.837567] ? pcpu_alloc+0x12a/0x1240 [ 2113.837940] kernfs_new_node+0x18d/0x250 [ 2113.838323] kernfs_create_dir_ns+0x49/0x160 [ 2113.838734] cgroup_mkdir+0x318/0xf50 [ 2113.839094] ? cgroup_destroy_locked+0x710/0x710 [ 2113.839531] kernfs_iop_mkdir+0x14d/0x1e0 [ 2113.839930] vfs_mkdir+0x493/0x750 [ 2113.840263] do_mkdirat+0x150/0x2b0 [ 2113.840602] ? user_path_create+0xf0/0xf0 [ 2113.840988] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2113.841469] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2113.841945] do_syscall_64+0x33/0x40 [ 2113.842288] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2113.842755] RIP: 0033:0x7f063061cb19 [ 2113.843103] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2113.860711] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2113.861403] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 2113.862045] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2113.862691] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 2113.863335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2113.863999] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 13:54:28 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x301100, 0x20) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x24400, 0x70, 0x12}, 0x18) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) 13:54:28 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x88d) 13:54:28 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x3) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13:54:28 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 25) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) 13:54:28 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x10000}, {0x0, 0x0, 0x1001000a00}], 0x2801018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={&(0x7f00000006c0), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x2, 0x2, 0x3f, 0x4, 0x0, 0x0, 0x10084, 0xa, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2771, 0x4, @perf_config_ext={0x80000001}, 0x100, 0x100000000, 0x101, 0x8, 0x0, 0x4, 0x8000, 0x0, 0x10000, 0x0, 0x3}, 0x0, 0x1, r0, 0xb) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='./file0\x00', 0x100, 0x190) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(&(0x7f0000000200), 0x0, &(0x7f0000000280), 0x4010444, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e633d72646d612c70bc7283ca8c8d0150503ba17fb4d5be3d308e00000000000000"]) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000700)='mnt/encrypted_dir\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r2, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') clone3(&(0x7f0000000580)={0x50002000, &(0x7f0000000240)=0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000380), {0xa}, &(0x7f00000003c0)=""/9, 0x9, &(0x7f0000000500)=""/96, &(0x7f0000000400)=[0x0], 0x1, {r2}}, 0x58) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r3, 0xf501, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000800)={'#! ', './file0', [{0x20, '^'}], 0xa, "4c66bfedd7e16b0d1b2e43ca45bfced89650f6b4bf9a07eeb344ef47d512654ef5e9f904d14d953364e5a59104169189c8224be81b1b9d905ee1267311ff21617e3c63043c6374124b880a0cea4a20978e4ee63ec29567d0116b732487930f1da37a83b2e9a333e8e1408a9ed81e55dba6eebde1bd6318b7896b331df89f6442603cfd5ca547e0d3b1f959abd52510a776923e10349872fc5fd8389fb5f3abbf08fb157c35092ff98ea3023e2875e933bdfec6d5c69cb9262ee4e05088b96a178e04fb3a9fa224cc5ecff884ea9111e33007"}, 0xdf) 13:54:29 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000300)='mnt/encrypted_dir/file0\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="240000006d00210c000000000000000000020210000000"], 0x24}}, 0x0) bind(r1, &(0x7f0000000080)=@ieee802154={0x24, @none={0x0, 0x1}}, 0x80) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="2400000000000000290000003200000000000000000000000000ffffac14142c", @ANYRES32=r2, @ANYBLOB="0000f9ff04de68c137eae998bf"], 0x28, 0xfffffdef}, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$inet6(r3, &(0x7f0000000180)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c, 0x0, 0x0, &(0x7f0000000240)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2c}}, r5}}}], 0x28, 0xfffffdef}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000800)={0x3f0, 0x0, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [{{0x8}, {0x134, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x214, 0x2, 0x0, 0x1, [{0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x0, 0x3, 0x2, 0x102}, {0x81, 0x1, 0x7, 0xffff0001}, {0x3, 0x49, 0x0, 0x2}, {0x3, 0x1, 0x80, 0xfffffffe}, {0xbf3a, 0x2, 0x7f, 0x80}]}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0xaf, 0x0, 0x1f, 0x7}, {0x40, 0x5, 0x1, 0x2}, {0x0, 0x5, 0x9, 0x6}, {0x7fff, 0x5, 0xf9, 0x9}, {0x400, 0x32, 0x7, 0x8}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x40}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xed0b}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r5}}}]}}]}, 0x3f0}, 0x1, 0x0, 0x0, 0x20040804}, 0x0) [ 2113.976364] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 13:54:29 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x88f) [ 2114.066135] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 2114.085275] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' 13:54:29 executing program 3: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x7de) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 13:54:29 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1450f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x24, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@generic="fb97c1b8b32feaeee2bedfe610"]}, 0x24}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x4, 0x0, 0x0, 0x3, &(0x7f0000000140)=ANY=[@ANYRES16=r6, @ANYRESHEX=r0, @ANYRESHEX=r3, @ANYRESDEC=r0, @ANYRESDEC=r4, @ANYRESDEC=r5, @ANYRES64, @ANYRES16=r1, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) 13:54:29 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) mkdirat(r1, 0x0, 0x2) umount2(&(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xfa2b, 0x0) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 26) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES32=r1, @ANYRESDEC=r1]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) symlinkat(&(0x7f0000000440)='./file0\x00', r0, &(0x7f0000000480)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) mkdirat(r4, &(0x7f00000005c0)='./file0\x00', 0x2) [ 2114.153982] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2114.162374] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2114.171364] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 13:54:29 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x8b0) [ 2114.180472] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2114.187287] tmpfs: Unknown parameter '' 13:54:29 executing program 7: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x4) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) r3 = fork() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) connect$unix(r4, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) io_uring_enter(r1, 0x630a, 0xce52, 0x2, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) [ 2114.214935] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2114.216204] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 13:54:29 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_rdma(0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000080)='./file0\x00') chdir(&(0x7f0000000300)='./file2\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/103, 0x67}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) umount2(&(0x7f0000000000)='./file2\x00', 0xf) [ 2114.228783] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2114.229746] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2114.230829] tmpfs: Unknown parameter '' [ 2114.233545] FAULT_INJECTION: forcing a failure. [ 2114.233545] name failslab, interval 1, probability 0, space 0, times 0 [ 2114.234634] CPU: 1 PID: 64282 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 2114.235214] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2114.235929] Call Trace: [ 2114.236164] dump_stack+0x107/0x167 [ 2114.236476] should_fail.cold+0x5/0xa [ 2114.236808] ? kvmalloc_node+0x119/0x170 [ 2114.237157] should_failslab+0x5/0x20 [ 2114.237483] __kmalloc_node+0x76/0x420 [ 2114.237822] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2114.238236] kvmalloc_node+0x119/0x170 [ 2114.238708] simple_xattr_alloc+0x43/0xa0 [ 2114.239058] simple_xattr_set+0x75/0x610 [ 2114.239409] kernfs_xattr_set+0x50/0x80 [ 2114.239750] selinux_kernfs_init_security+0x26d/0x4c0 [ 2114.240197] ? selinux_file_mprotect+0x610/0x610 [ 2114.240596] ? find_held_lock+0x2c/0x110 [ 2114.240942] ? __kernfs_new_node+0x2ad/0x860 [ 2114.241319] ? rwlock_bug.part.0+0x90/0x90 [ 2114.241684] security_kernfs_init_security+0x4e/0xb0 [ 2114.242112] __kernfs_new_node+0x531/0x860 [ 2114.242472] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2114.242872] ? cpumask_next+0x1f/0x30 [ 2114.243192] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2114.243585] ? pcpu_alloc+0x12a/0x1240 [ 2114.243936] kernfs_new_node+0x18d/0x250 [ 2114.244288] kernfs_create_dir_ns+0x49/0x160 [ 2114.244664] cgroup_mkdir+0x318/0xf50 [ 2114.244991] ? cgroup_destroy_locked+0x710/0x710 [ 2114.245394] kernfs_iop_mkdir+0x14d/0x1e0 [ 2114.245748] vfs_mkdir+0x493/0x750 [ 2114.246052] do_mkdirat+0x150/0x2b0 [ 2114.246361] ? user_path_create+0xf0/0xf0 [ 2114.246713] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2114.247152] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2114.247585] do_syscall_64+0x33/0x40 [ 2114.247909] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2114.248343] RIP: 0033:0x7f063061cb19 [ 2114.248656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2114.250178] RSP: 002b:00007f062db92188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2114.250814] RAX: ffffffffffffffda RBX: 00007f063072ff60 RCX: 00007f063061cb19 [ 2114.251406] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2114.252011] RBP: 00007f062db921d0 R08: 0000000000000000 R09: 0000000000000000 [ 2114.252605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2114.253200] R13: 00007ffe0d9a87af R14: 00007f062db92300 R15: 0000000000022000 13:54:29 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ffffffffffffffd}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x9, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x751) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001800), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) fork() connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 13:54:29 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x5, 0xfffffffffffffd2d, 0x0, 0x91, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0xfa2b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC]) unlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x200) chown(&(0x7f0000000040)='./file0\x00', 0xee00, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) getresuid(0x0, &(0x7f00000003c0), &(0x7f0000000400)) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x8, 0x1) [ 2114.370910] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 2114.372163] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' [ 2114.386202] tmpfs: Unknown parameter 'ÿÿ01777777777777777777777ÿÿÿÿ18446744073709551615' [ 2128.166586] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888048016a90 (size 144): comm "syz-executor.6", pid 64282, jiffies 4296781260 (age 21.467s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 95 ac dd 66 00 00 00 00 ...........f.... 30 3e 83 1a 00 00 00 00 95 ac dd 66 00 00 00 00 0>.........f.... backtrace: [<000000003ca1cdf6>] __kernfs_iattrs+0xbc/0x470 [<00000000835996b7>] kernfs_xattr_set+0x2b/0x80 [<0000000002b6bab0>] selinux_kernfs_init_security+0x26d/0x4c0 [<000000005fff176a>] security_kernfs_init_security+0x4e/0xb0 [<000000003df07d56>] __kernfs_new_node+0x531/0x860 [<00000000148e3061>] kernfs_new_node+0x18d/0x250 [<0000000084d2b1f4>] kernfs_create_dir_ns+0x49/0x160 [<000000001f835c3f>] cgroup_mkdir+0x318/0xf50 [<00000000c938f7e7>] kernfs_iop_mkdir+0x14d/0x1e0 [<00000000b2807e50>] vfs_mkdir+0x493/0x750 [<00000000a7f4606f>] do_mkdirat+0x150/0x2b0 [<00000000f2e54fe3>] do_syscall_64+0x33/0x40 [<000000000c3fbe6c>] entry_SYSCALL_64_after_hwframe+0x67/0xd1 BUG: leak checking failed VM DIAGNOSIS: 13:54:51 Registers: info registers vcpu 0 RAX=ffffffff83e78260 RBX=0000000000000000 RCX=ffffffff83e6005c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e78868 RBP=fffffbfff09c6450 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85675f08 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e7826e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00005639696b51e0 CR3=000000000d1a2000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=656a626f206465636e6572656665726e XMM02=2934343120657a697328203039613631 XMM03=3620646970202c22362e726f74756365 XMM04=2e2e2e2e2e2e2e202030302030302030 XMM05=20303020303020303020303020303020 XMM06=65747962203233207473726966282070 XMM07=31322065676128203036323138373639 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e78260 RBX=0000000000000001 RCX=ffffffff83e6005c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e78868 RBP=ffffed1001130000 RSP=ffff88800898fe70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85675f08 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e7826e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe2300000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fffb0a11fe8 CR3=000000000d3a4000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=000000000000000041433f1c00000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000