sockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:47:33 executing program 2: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 2587.492934] tmpfs: Unknown parameter '' 18:47:33 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x820000, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x20000000) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x10000, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000040)={r1, 0x20, 0x101, 0x8001}) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)=0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r5) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000004dc88c8086e23761bc5cae75fcca74aa396e44e86de9df16479bfe46f7857464ae507465aa6283a3d110c8716efc0cde03bb4f9d3c0139f162a7e3b518df", @ANYRES16=r6, @ANYBLOB="00022dbd7000800000000600000008000300", @ANYRES32=r7, @ANYBLOB], 0x1c}}, 0x4) ioctl$AUTOFS_IOC_PROTOSUBVER(r5, 0x80049367, &(0x7f0000000200)) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c0000002017637f4977c65106000000020000000300af0180ccf2c5a4ec7f30112adc06cae9b8976cf0fdc28e36c7bc31b6a7ca678986b3c8bcbd8115be6565357d05f4ddf20e90e4188c24c6150388b2bbf53973c5fa1520ab29d0ac056be2e4e5f9a5654582d85ce9f3af268fe532dac1225e685efaf47a278d9781aa89857409b2dc23a53c42ae5f8d6b96c7c9aef58ccd5c7c374081e3cc93989aa465ea857e5762d5052e74867525ca2a192a6ff1933ed90c0767efcd0fd6dc9f5dce977131cd062174f785e14dc7fea4f5604d33766ae8cf40e14b640f74a90c16a38b1d68fe076637745f5788c5530649da7c0540"], 0x1c}}, 0x0) r9 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdirat(r9, &(0x7f0000000280)='./file1\x00', 0x118) 18:47:33 executing program 5: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000400)=""/202, 0xca}], 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:47:33 executing program 4: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r0, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000400)=""/202, 0xca}], 0x2) 18:47:33 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x20000000) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x10080, 0x31) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:47:33 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) [ 2587.552171] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2587.563151] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2587.608981] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.5'. 18:47:33 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x20000000) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x18) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') [ 2587.678831] tmpfs: Unknown parameter '' 18:47:47 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:47:47 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:47:47 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:47:47 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x0, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r4}, 0x14) 18:47:47 executing program 4: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000400)=""/202, 0xca}], 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:47:47 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x0, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r4}, 0x14) 18:47:47 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000440)='./file1\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x3, &(0x7f00000003c0)=[{&(0x7f00000001c0)="dc1852e60df0438a1e54539d0e1b50b66f6f35de6ecacf1a3b7102c315eb23d7cd8e5357259971fb7874968da288b8bb53127f855b8a96fa6ea0a843ca4215be4f14d41560d160779bfd7011d3218066ce4702d360dff2f99749f7a1509ed831d17ba94b029ac7b6187924849940bcca39c2fceb885c42606c7cd4ee1fb7a0940bba277ed3e56968cb", 0x89, 0x6}, {&(0x7f0000000640)="c23ddf62cacbd7c52b21f96e292669805145f0a17bce39e90175ef9b84ece5de99d1f7a6526689c476a32fb27eaa411dea95b6ff4e7c88d9f9ca8dd0613a061781b41c6286d72de820b98380788c22d4d67d15fe4e68e3bbff5ce233ef8a111c95dd47a1c3d6ded896fc00c2247b511575609a4266fb98185042b14c1ed0c2c64a61df785f0fa573d26fe58b042f6bbaa3189cc34f7f7ba109d1c7cf85d007ad600ff52eece2886dd909c927e21231d1f2", 0xb1, 0x2189}, {&(0x7f0000000340)="b18b08090a375c2c1caa86e2223bb8718c00c44a7df3713c8adbadb7fa179f0c0ca3f4bcb0301e57c04ff3dc26cc1e0cffbc7915c5c95d56f0546f4bf5482f9d7024466715bc86a0d4aa1daeaad3eebbcd43f2579ab93d", 0x57, 0xfff}], 0x2058, &(0x7f0000000500)={[{@journal_async_commit}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@user_xattr}, {@journal_async_commit}, {@min_batch_time={'min_batch_time', 0x3d, 0x2}}], [{@fowner_eq={'fowner', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@appraise}, {@subj_type={'subj_type', 0x3d, 'proc\x00'}}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@subj_type={'subj_type', 0x3d, ']('}}, {@obj_role={'obj_role', 0x3d, 'proc\x00'}}, {@subj_type={'subj_type', 0x3d, '}(,'}}, {@audit}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:47:47 executing program 6: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000400)=""/202, 0xca}], 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 2601.180609] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2601.200307] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2601.202057] tmpfs: Unknown parameter '' [ 2601.204343] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2601.206633] tmpfs: Unknown parameter '' 18:47:47 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000440)='./file1\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x3, &(0x7f00000003c0)=[{&(0x7f00000001c0)="dc1852e60df0438a1e54539d0e1b50b66f6f35de6ecacf1a3b7102c315eb23d7cd8e5357259971fb7874968da288b8bb53127f855b8a96fa6ea0a843ca4215be4f14d41560d160779bfd7011d3218066ce4702d360dff2f99749f7a1509ed831d17ba94b029ac7b6187924849940bcca39c2fceb885c42606c7cd4ee1fb7a0940bba277ed3e56968cb", 0x89, 0x6}, {&(0x7f0000000640)="c23ddf62cacbd7c52b21f96e292669805145f0a17bce39e90175ef9b84ece5de99d1f7a6526689c476a32fb27eaa411dea95b6ff4e7c88d9f9ca8dd0613a061781b41c6286d72de820b98380788c22d4d67d15fe4e68e3bbff5ce233ef8a111c95dd47a1c3d6ded896fc00c2247b511575609a4266fb98185042b14c1ed0c2c64a61df785f0fa573d26fe58b042f6bbaa3189cc34f7f7ba109d1c7cf85d007ad600ff52eece2886dd909c927e21231d1f2", 0xb1, 0x2189}, {&(0x7f0000000340)="b18b08090a375c2c1caa86e2223bb8718c00c44a7df3713c8adbadb7fa179f0c0ca3f4bcb0301e57c04ff3dc26cc1e0cffbc7915c5c95d56f0546f4bf5482f9d7024466715bc86a0d4aa1daeaad3eebbcd43f2579ab93d", 0x57, 0xfff}], 0x2058, &(0x7f0000000500)={[{@journal_async_commit}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@user_xattr}, {@journal_async_commit}, {@min_batch_time={'min_batch_time', 0x3d, 0x2}}], [{@fowner_eq={'fowner', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@appraise}, {@subj_type={'subj_type', 0x3d, 'proc\x00'}}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@subj_type={'subj_type', 0x3d, ']('}}, {@obj_role={'obj_role', 0x3d, 'proc\x00'}}, {@subj_type={'subj_type', 0x3d, '}(,'}}, {@audit}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:47:47 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:47:47 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:47:47 executing program 3: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x6, 0x4, &(0x7f0000000400)=[{&(0x7f00000001c0)="871cb46039920aa13631fc177be63c4262c1d632a09ebfd82e73b7dc369da497eddeaa545dbb92082964e49a1205b5e0a8f182a74c42c81e23cfecaaedfbf4ead7f79d4b83593429ec2d6963e938258ea87cbcedc0fa7fe3b278e642416e0d1f50f36c8ed026e889d9c8162406fec5983c4069d2a8fd521ad589cca61fb94490189f6cac0143bed6b88577aad4f882ebfcae1f5f26d8fd9f3c981ab884f5c130912e5a9714671679", 0xa8, 0x1}, {&(0x7f0000000280)="580aa062b82e092b547ae3015218dc5fbc248de9d11dee9b3090d5f649ef0003f2a114b81f9817163cb899e594a75f5cf043602d5b1b5366c7de8d66e591fce1ae102a37561c05cf6d01446397d0ec7656170776aca741c83273c35a68f976811d6cb89d551c6be31d82a868b9727d13d118196b5861b590d44356ce01cc3ce09926a3eb9cc98d97e02ec3ab46038ffb5a26c62e", 0x94, 0x7}, {&(0x7f0000000340)="e641ff23aa476a72f60ec4c1ffff1b6eac58592e4849749a5c50162498a7dd0d8cd13ecb482f836fe40fc6cf2a728a7ec085c7267901b42f4851903867214f6aeda82c8d7111b1d2", 0x48, 0x2}, {&(0x7f00000003c0)="8a894166da95bdeffcdd915491556fa91936aebef55778c65cacce", 0x1b, 0x5}], 0x1008802, &(0x7f0000000480)={[{@barrier}, {@noinit_itable}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1}}, {@noinit_itable}, {@nobarrier}, {@data_err_ignore}, {@resgid}, {@nomblk_io_submit}, {@nobh}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}], [{@func={'func', 0x3d, 'BPRM_CHECK'}}, {@obj_type={'obj_type', 0x3d, '\xdb'}}, {@obj_user={'obj_user', 0x3d, '#'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) open_tree(r1, &(0x7f0000000580)='./file2\x00', 0x80001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:47:47 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:47:47 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x0, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r4}, 0x14) [ 2601.426988] tmpfs: Unknown parameter '' [ 2601.450962] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2601.455226] tmpfs: Unknown parameter '' 18:48:03 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000440)='./file1\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x3, &(0x7f00000003c0)=[{&(0x7f00000001c0)="dc1852e60df0438a1e54539d0e1b50b66f6f35de6ecacf1a3b7102c315eb23d7cd8e5357259971fb7874968da288b8bb53127f855b8a96fa6ea0a843ca4215be4f14d41560d160779bfd7011d3218066ce4702d360dff2f99749f7a1509ed831d17ba94b029ac7b6187924849940bcca39c2fceb885c42606c7cd4ee1fb7a0940bba277ed3e56968cb", 0x89, 0x6}, {&(0x7f0000000640)="c23ddf62cacbd7c52b21f96e292669805145f0a17bce39e90175ef9b84ece5de99d1f7a6526689c476a32fb27eaa411dea95b6ff4e7c88d9f9ca8dd0613a061781b41c6286d72de820b98380788c22d4d67d15fe4e68e3bbff5ce233ef8a111c95dd47a1c3d6ded896fc00c2247b511575609a4266fb98185042b14c1ed0c2c64a61df785f0fa573d26fe58b042f6bbaa3189cc34f7f7ba109d1c7cf85d007ad600ff52eece2886dd909c927e21231d1f2", 0xb1, 0x2189}, {&(0x7f0000000340)="b18b08090a375c2c1caa86e2223bb8718c00c44a7df3713c8adbadb7fa179f0c0ca3f4bcb0301e57c04ff3dc26cc1e0cffbc7915c5c95d56f0546f4bf5482f9d7024466715bc86a0d4aa1daeaad3eebbcd43f2579ab93d", 0x57, 0xfff}], 0x2058, &(0x7f0000000500)={[{@journal_async_commit}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@user_xattr}, {@journal_async_commit}, {@min_batch_time={'min_batch_time', 0x3d, 0x2}}], [{@fowner_eq={'fowner', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@appraise}, {@subj_type={'subj_type', 0x3d, 'proc\x00'}}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@subj_type={'subj_type', 0x3d, ']('}}, {@obj_role={'obj_role', 0x3d, 'proc\x00'}}, {@subj_type={'subj_type', 0x3d, '}(,'}}, {@audit}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:48:03 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x0, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:48:03 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:48:03 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x0, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:48:03 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:48:03 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={@mcast1, 0x56}) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c5efac82e", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/244], 0x13c}}, 0x0) readv(0xffffffffffffffff, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000400)=""/202, 0xca}], 0x2) 18:48:03 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:48:03 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x0, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2617.760634] tmpfs: Unknown parameter '' [ 2617.762227] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2617.784452] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.6'. 18:48:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:48:04 executing program 2: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:48:04 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000440)='./file1\x00', &(0x7f0000000480), 0x6000) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') [ 2617.865584] tmpfs: Unknown parameter '' 18:48:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x0, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:48:04 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={@mcast1, 0x56}) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c5efac82e", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/244], 0x13c}}, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r1, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000400)=""/202, 0xca}], 0x2) 18:48:04 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:48:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:48:04 executing program 4: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={@mcast1, 0x56}) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c5efac82e", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/244], 0x13c}}, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r2, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000400)=""/202, 0xca}], 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r0) [ 2617.953613] tmpfs: Unknown parameter '' [ 2618.001157] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2618.013098] tmpfs: Unknown parameter '' [ 2618.018292] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'. 18:48:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) [ 2618.039059] tmpfs: Unknown parameter '' [ 2618.061161] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2618.153071] tmpfs: Unknown parameter '' 18:48:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:48:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:48:18 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:48:18 executing program 2: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:48:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:48:18 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x10, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:48:18 executing program 3: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f0", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000400)=""/202, 0xca}], 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:48:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) [ 2632.368054] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2632.368349] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. 18:48:18 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') [ 2632.387660] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2632.395203] tmpfs: Unknown parameter '' [ 2632.402641] tmpfs: Unknown parameter '' [ 2632.407133] tmpfs: Unknown parameter '' [ 2632.426641] tmpfs: Unknown parameter '' 18:48:18 executing program 4: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000400)=""/202, 0xca}], 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:48:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:48:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:48:18 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x10, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:48:18 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x0, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:48:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:48:18 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') [ 2632.703450] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2632.710378] tmpfs: Unknown parameter '' [ 2632.712113] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 18:48:19 executing program 2: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000400)=""/202, 0xca}], 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 2632.744909] tmpfs: Unknown parameter '' 18:48:19 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:48:19 executing program 3: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f0", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000400)=""/202, 0xca}], 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 2632.792019] tmpfs: Unknown parameter '' [ 2632.861028] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'. 18:48:19 executing program 5: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000400)=""/202, 0xca}], 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 2632.871638] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. 18:48:19 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x10, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:48:19 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) [ 2632.955210] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2632.958604] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.5'. 18:48:19 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:48:19 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) [ 2633.069417] tmpfs: Unknown parameter '' 18:48:19 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 2633.123396] tmpfs: Unknown parameter '' [ 2633.192551] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2648.435857] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2648.445578] tmpfs: Unknown parameter '' 18:48:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:48:34 executing program 2: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000400)=""/202, 0xca}], 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:48:34 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:48:34 executing program 6: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x10, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:48:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:48:34 executing program 3: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000400)=""/202, 0xca}], 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:48:34 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:48:34 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:48:34 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:48:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) [ 2648.482006] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2648.513514] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2648.542106] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2648.543043] tmpfs: Unknown parameter '' [ 2648.564196] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. 18:48:34 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') [ 2648.634403] tmpfs: Unknown parameter '' 18:48:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, 0x0, 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:48:49 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') [ 2662.790782] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2662.794339] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. 18:48:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:48:49 executing program 4: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000400)=""/202, 0xca}], 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:48:49 executing program 2: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:48:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x0, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:48:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x0, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:48:49 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(0x0, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 2662.863544] tmpfs: Unknown parameter '' [ 2662.873031] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 18:48:49 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(0x0, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:48:49 executing program 2: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={@mcast1, 0x56}) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c5efac82e", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/244], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000400)=""/202, 0xca}], 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) ioctl$sock_SIOCDELRT(r5, 0x890c, &(0x7f0000000700)={0x0, @xdp={0x2c, 0x8, 0x0, 0xc}, @hci={0x1f, 0x1, 0x4}, @vsock={0x28, 0x0, 0xffffffff, @host}, 0x20, 0x0, 0x0, 0x0, 0x101, &(0x7f00000006c0)='batadv_slave_1\x00', 0x8, 0x6, 0x5}) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) [ 2662.903908] tmpfs: Unknown parameter '' [ 2662.923795] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2663.014240] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. 18:49:04 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:49:04 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x0, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:49:04 executing program 2: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000400)=""/202, 0xca}], 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:49:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x0, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r4}, 0x14) 18:49:04 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(0x0, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:49:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:49:04 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:49:04 executing program 6: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={@mcast1, 0x56}) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c5efac82e", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/244], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000400)=""/202, 0xca}], 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) ioctl$sock_SIOCDELRT(r5, 0x890c, &(0x7f0000000700)={0x0, @xdp={0x2c, 0x8, 0x0, 0xc}, @hci={0x1f, 0x1, 0x4}, @vsock={0x28, 0x0, 0xffffffff, @host}, 0x20, 0x0, 0x0, 0x0, 0x101, &(0x7f00000006c0)='batadv_slave_1\x00', 0x8, 0x6, 0x5}) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) [ 2678.664927] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2678.670487] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2678.692297] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2678.709545] tmpfs: Unknown parameter '' 18:49:05 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') [ 2678.749402] tmpfs: Unknown parameter '' 18:49:05 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') (fail_nth: 1) 18:49:05 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, 0x0, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:49:05 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 1) 18:49:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:49:05 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) (fail_nth: 1) 18:49:05 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') [ 2678.855378] FAULT_INJECTION: forcing a failure. [ 2678.855378] name failslab, interval 1, probability 0, space 0, times 0 [ 2678.857416] CPU: 0 PID: 11310 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2678.858659] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2678.860161] Call Trace: [ 2678.860636] dump_stack+0x107/0x167 [ 2678.861296] should_fail.cold+0x5/0xa [ 2678.861990] ? getname_flags.part.0+0x50/0x4f0 [ 2678.862813] should_failslab+0x5/0x20 [ 2678.863506] kmem_cache_alloc+0x5b/0x310 [ 2678.864236] ? ksys_write+0x21a/0x260 [ 2678.864917] getname_flags.part.0+0x50/0x4f0 [ 2678.865702] user_path_at_empty+0xa1/0x100 [ 2678.866452] __do_sys_pivot_root+0x13d/0x14b0 [ 2678.867262] ? wait_for_completion_io+0x270/0x270 [ 2678.868143] ? rcu_read_lock_any_held+0x75/0xa0 [ 2678.868972] ? vfs_write+0x354/0xb10 [ 2678.869627] ? is_path_reachable+0x110/0x110 [ 2678.870411] ? fput_many+0x2f/0x1a0 [ 2678.871059] ? ksys_write+0x1a9/0x260 [ 2678.871743] ? __ia32_sys_read+0xb0/0xb0 [ 2678.872466] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2678.873417] do_syscall_64+0x33/0x40 [ 2678.874081] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2678.874991] RIP: 0033:0x7f3f260f0b19 [ 2678.875653] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2678.878955] RSP: 002b:00007f3f23666188 EFLAGS: 00000246 ORIG_RAX: 000000000000009b [ 2678.880316] RAX: ffffffffffffffda RBX: 00007f3f26203f60 RCX: 00007f3f260f0b19 [ 2678.881573] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 2678.882844] RBP: 00007f3f236661d0 R08: 0000000000000000 R09: 0000000000000000 [ 2678.884098] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2678.885360] R13: 00007ffd98feef9f R14: 00007f3f23666300 R15: 0000000000022000 [ 2678.902212] FAULT_INJECTION: forcing a failure. [ 2678.902212] name failslab, interval 1, probability 0, space 0, times 0 [ 2678.903371] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2678.904786] CPU: 1 PID: 11315 Comm: syz-executor.5 Not tainted 5.10.234 #1 [ 2678.907529] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2678.909267] Call Trace: [ 2678.909821] dump_stack+0x107/0x167 [ 2678.910582] should_fail.cold+0x5/0xa [ 2678.911388] ? getname_flags.part.0+0x50/0x4f0 [ 2678.912349] should_failslab+0x5/0x20 [ 2678.913144] kmem_cache_alloc+0x5b/0x310 [ 2678.913999] getname_flags.part.0+0x50/0x4f0 [ 2678.914904] getname_flags+0x9a/0xe0 [ 2678.915685] __x64_sys_rename+0x56/0xa0 [ 2678.916508] do_syscall_64+0x33/0x40 [ 2678.917279] entry_SYSCALL_64_after_hwframe+0x67/0xd1 18:49:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 1) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r4}, 0x14) [ 2678.918328] RIP: 0033:0x7f945b569b19 [ 2678.919261] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2678.923111] RSP: 002b:00007f9458adf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2678.924690] RAX: ffffffffffffffda RBX: 00007f945b67cf60 RCX: 00007f945b569b19 [ 2678.926193] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000020000140 [ 2678.927738] RBP: 00007f9458adf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2678.929275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2678.930799] R13: 00007fff3271b00f R14: 00007f9458adf300 R15: 0000000000022000 [ 2678.934195] FAULT_INJECTION: forcing a failure. [ 2678.934195] name failslab, interval 1, probability 0, space 0, times 0 [ 2678.936818] CPU: 1 PID: 11316 Comm: syz-executor.4 Not tainted 5.10.234 #1 [ 2678.938298] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2678.940066] Call Trace: [ 2678.940635] dump_stack+0x107/0x167 [ 2678.941433] should_fail.cold+0x5/0xa [ 2678.942253] ? getname_flags.part.0+0x50/0x4f0 [ 2678.943247] should_failslab+0x5/0x20 [ 2678.944059] kmem_cache_alloc+0x5b/0x310 [ 2678.944924] ? ksys_write+0x12d/0x260 [ 2678.945748] getname_flags.part.0+0x50/0x4f0 [ 2678.946662] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2678.947661] user_path_at_empty+0xa1/0x100 [ 2678.948557] path_setxattr+0x95/0x190 18:49:05 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') [ 2678.949352] ? setxattr+0x330/0x330 [ 2678.950253] ? ksys_write+0x1a9/0x260 [ 2678.951058] ? __ia32_sys_read+0xb0/0xb0 [ 2678.951906] __x64_sys_setxattr+0xc0/0x160 [ 2678.952784] do_syscall_64+0x33/0x40 [ 2678.953560] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2678.954627] RIP: 0033:0x7fccd104ab19 [ 2678.955406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2678.959262] RSP: 002b:00007fccce5c0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 2678.960878] RAX: ffffffffffffffda RBX: 00007fccd115df60 RCX: 00007fccd104ab19 [ 2678.962392] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2678.963904] RBP: 00007fccce5c01d0 R08: 0000000000000000 R09: 0000000000000000 [ 2678.965416] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2678.966922] R13: 00007ffe78c2024f R14: 00007fccce5c0300 R15: 0000000000022000 [ 2678.979106] tmpfs: Unknown parameter '' 18:49:05 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, 0x0, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:49:05 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 1) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:49:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r4}, 0x14) 18:49:05 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') (fail_nth: 2) 18:49:05 executing program 1: mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:49:05 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) (fail_nth: 2) 18:49:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) [ 2679.108985] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2679.112222] FAULT_INJECTION: forcing a failure. [ 2679.112222] name failslab, interval 1, probability 0, space 0, times 0 [ 2679.113893] CPU: 0 PID: 11334 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2679.114902] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2679.116124] Call Trace: [ 2679.116516] dump_stack+0x107/0x167 [ 2679.117058] should_fail.cold+0x5/0xa [ 2679.117616] ? create_object.isra.0+0x3a/0xa20 [ 2679.118303] should_failslab+0x5/0x20 [ 2679.118858] kmem_cache_alloc+0x5b/0x310 [ 2679.119459] create_object.isra.0+0x3a/0xa20 [ 2679.120104] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2679.120863] kmem_cache_alloc+0x159/0x310 [ 2679.121480] ? ksys_write+0x21a/0x260 [ 2679.122105] getname_flags.part.0+0x50/0x4f0 [ 2679.122755] user_path_at_empty+0xa1/0x100 [ 2679.123398] __do_sys_pivot_root+0x13d/0x14b0 [ 2679.124058] ? wait_for_completion_io+0x270/0x270 [ 2679.124773] ? rcu_read_lock_any_held+0x75/0xa0 [ 2679.125455] ? vfs_write+0x354/0xb10 [ 2679.126000] ? is_path_reachable+0x110/0x110 [ 2679.126633] ? fput_many+0x2f/0x1a0 [ 2679.127175] ? ksys_write+0x1a9/0x260 [ 2679.127740] ? __ia32_sys_read+0xb0/0xb0 [ 2679.128347] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2679.129110] do_syscall_64+0x33/0x40 [ 2679.129667] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2679.130410] RIP: 0033:0x7f3f260f0b19 [ 2679.130949] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2679.133639] RSP: 002b:00007f3f23666188 EFLAGS: 00000246 ORIG_RAX: 000000000000009b [ 2679.134742] RAX: ffffffffffffffda RBX: 00007f3f26203f60 RCX: 00007f3f260f0b19 [ 2679.135793] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 2679.136832] RBP: 00007f3f236661d0 R08: 0000000000000000 R09: 0000000000000000 [ 2679.137861] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2679.138897] R13: 00007ffd98feef9f R14: 00007f3f23666300 R15: 0000000000022000 [ 2679.141285] FAULT_INJECTION: forcing a failure. [ 2679.141285] name failslab, interval 1, probability 0, space 0, times 0 [ 2679.143882] CPU: 1 PID: 11328 Comm: syz-executor.2 Not tainted 5.10.234 #1 [ 2679.145358] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2679.147108] Call Trace: [ 2679.147667] dump_stack+0x107/0x167 [ 2679.148447] should_fail.cold+0x5/0xa [ 2679.149280] ? getname_flags.part.0+0x50/0x4f0 [ 2679.150266] should_failslab+0x5/0x20 [ 2679.151086] kmem_cache_alloc+0x5b/0x310 [ 2679.151955] getname_flags.part.0+0x50/0x4f0 [ 2679.152880] getname_flags+0x9a/0xe0 [ 2679.153660] __x64_sys_rename+0x56/0xa0 [ 2679.154486] do_syscall_64+0x33/0x40 [ 2679.155274] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2679.156352] RIP: 0033:0x7f721cbccb19 [ 2679.157121] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2679.161218] RSP: 002b:00007f721a142188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2679.162806] RAX: ffffffffffffffda RBX: 00007f721ccdff60 RCX: 00007f721cbccb19 [ 2679.164349] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2679.165853] RBP: 00007f721a1421d0 R08: 0000000000000000 R09: 0000000000000000 [ 2679.167354] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2679.168848] R13: 00007ffef6b29f6f R14: 00007f721a142300 R15: 0000000000022000 [ 2679.185623] FAULT_INJECTION: forcing a failure. [ 2679.185623] name failslab, interval 1, probability 0, space 0, times 0 [ 2679.188008] CPU: 1 PID: 11338 Comm: syz-executor.5 Not tainted 5.10.234 #1 [ 2679.189450] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2679.191236] Call Trace: [ 2679.191779] dump_stack+0x107/0x167 [ 2679.192532] should_fail.cold+0x5/0xa [ 2679.193338] ? create_object.isra.0+0x3a/0xa20 [ 2679.194311] should_failslab+0x5/0x20 [ 2679.195118] kmem_cache_alloc+0x5b/0x310 [ 2679.195978] create_object.isra.0+0x3a/0xa20 [ 2679.196895] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2679.197970] kmem_cache_alloc+0x159/0x310 [ 2679.198841] getname_flags.part.0+0x50/0x4f0 [ 2679.199766] getname_flags+0x9a/0xe0 [ 2679.200575] __x64_sys_rename+0x56/0xa0 [ 2679.201419] do_syscall_64+0x33/0x40 [ 2679.202202] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2679.203282] RIP: 0033:0x7f945b569b19 [ 2679.204066] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2679.207950] RSP: 002b:00007f9458adf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2679.209542] RAX: ffffffffffffffda RBX: 00007f945b67cf60 RCX: 00007f945b569b19 [ 2679.211065] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000020000140 [ 2679.212570] RBP: 00007f9458adf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2679.214094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2679.215607] R13: 00007fff3271b00f R14: 00007f9458adf300 R15: 0000000000022000 [ 2679.253160] tmpfs: Unknown parameter '' [ 2693.485003] FAULT_INJECTION: forcing a failure. [ 2693.485003] name failslab, interval 1, probability 0, space 0, times 0 [ 2693.486822] CPU: 1 PID: 11351 Comm: syz-executor.4 Not tainted 5.10.234 #1 [ 2693.487901] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2693.489179] Call Trace: [ 2693.489588] dump_stack+0x107/0x167 [ 2693.490160] should_fail.cold+0x5/0xa [ 2693.490754] ? create_object.isra.0+0x3a/0xa20 [ 2693.491471] should_failslab+0x5/0x20 [ 2693.492070] kmem_cache_alloc+0x5b/0x310 [ 2693.492694] create_object.isra.0+0x3a/0xa20 [ 2693.493369] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2693.494153] kmem_cache_alloc+0x159/0x310 [ 2693.494822] getname_flags.part.0+0x50/0x4f0 [ 2693.495505] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2693.496261] user_path_at_empty+0xa1/0x100 [ 2693.496366] FAULT_INJECTION: forcing a failure. [ 2693.496366] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2693.496912] path_setxattr+0x95/0x190 [ 2693.496928] ? setxattr+0x330/0x330 [ 2693.496949] ? ksys_write+0x1a9/0x260 [ 2693.500789] ? __ia32_sys_read+0xb0/0xb0 [ 2693.501415] __x64_sys_setxattr+0xc0/0x160 [ 2693.502083] do_syscall_64+0x33/0x40 [ 2693.502657] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2693.503446] RIP: 0033:0x7fccd104ab19 [ 2693.504036] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2693.506861] RSP: 002b:00007fccce5c0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 2693.508055] RAX: ffffffffffffffda RBX: 00007fccd115df60 RCX: 00007fccd104ab19 [ 2693.509181] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2693.510297] RBP: 00007fccce5c01d0 R08: 0000000000000000 R09: 0000000000000000 [ 2693.511405] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2693.512524] R13: 00007ffe78c2024f R14: 00007fccce5c0300 R15: 0000000000022000 [ 2693.513664] CPU: 0 PID: 11354 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2693.514915] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2693.516463] Call Trace: [ 2693.516958] dump_stack+0x107/0x167 [ 2693.517635] should_fail.cold+0x5/0xa [ 2693.518351] strncpy_from_user+0x34/0x470 [ 2693.519126] getname_flags.part.0+0x95/0x4f0 [ 2693.519961] user_path_at_empty+0xa1/0x100 [ 2693.520743] __do_sys_pivot_root+0x13d/0x14b0 [ 2693.521575] ? wait_for_completion_io+0x270/0x270 [ 2693.522494] ? rcu_read_lock_any_held+0x75/0xa0 [ 2693.523381] ? vfs_write+0x354/0xb10 [ 2693.524103] ? is_path_reachable+0x110/0x110 [ 2693.524944] ? fput_many+0x2f/0x1a0 [ 2693.525638] ? ksys_write+0x1a9/0x260 [ 2693.526561] ? __ia32_sys_read+0xb0/0xb0 [ 2693.527350] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2693.528378] do_syscall_64+0x33/0x40 [ 2693.529079] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2693.530017] RIP: 0033:0x7f3f260f0b19 [ 2693.530693] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2693.533285] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2693.534046] RSP: 002b:00007f3f23666188 EFLAGS: 00000246 ORIG_RAX: 000000000000009b [ 2693.534064] RAX: ffffffffffffffda RBX: 00007f3f26203f60 RCX: 00007f3f260f0b19 [ 2693.534079] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 2693.539355] RBP: 00007f3f236661d0 R08: 0000000000000000 R09: 0000000000000000 [ 2693.539414] FAULT_INJECTION: forcing a failure. [ 2693.539414] name fail_usercopy, interval 1, probability 0, space 0, times 0 18:49:19 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 2) 18:49:19 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') (fail_nth: 3) 18:49:19 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, 0x0, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:49:19 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f00000001c0)='./mnt\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f4817563d96f777e1c"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r4}, 0x14) 18:49:19 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) (fail_nth: 3) 18:49:19 executing program 1: mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:49:19 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 2) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2693.540657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2693.540667] R13: 00007ffd98feef9f R14: 00007f3f23666300 R15: 0000000000022000 [ 2693.545171] CPU: 1 PID: 11350 Comm: syz-executor.5 Not tainted 5.10.234 #1 [ 2693.546266] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2693.547563] Call Trace: [ 2693.547983] dump_stack+0x107/0x167 [ 2693.548565] should_fail.cold+0x5/0xa [ 2693.549174] strncpy_from_user+0x34/0x470 [ 2693.549831] getname_flags.part.0+0x95/0x4f0 [ 2693.550535] getname_flags+0x9a/0xe0 [ 2693.551126] __x64_sys_rename+0x56/0xa0 [ 2693.551758] do_syscall_64+0x33/0x40 [ 2693.552346] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2693.553167] RIP: 0033:0x7f945b569b19 [ 2693.553259] FAULT_INJECTION: forcing a failure. 18:49:19 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) [ 2693.553259] name failslab, interval 1, probability 0, space 0, times 0 [ 2693.553750] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2693.553758] RSP: 002b:00007f9458adf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2693.553772] RAX: ffffffffffffffda RBX: 00007f945b67cf60 RCX: 00007f945b569b19 [ 2693.553780] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000020000140 [ 2693.553787] RBP: 00007f9458adf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2693.553795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2693.553803] R13: 00007fff3271b00f R14: 00007f9458adf300 R15: 0000000000022000 [ 2693.568218] CPU: 0 PID: 11359 Comm: syz-executor.2 Not tainted 5.10.234 #1 [ 2693.569447] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2693.570928] Call Trace: [ 2693.571397] dump_stack+0x107/0x167 [ 2693.572063] should_fail.cold+0x5/0xa [ 2693.572746] ? create_object.isra.0+0x3a/0xa20 [ 2693.573563] should_failslab+0x5/0x20 [ 2693.574241] kmem_cache_alloc+0x5b/0x310 [ 2693.574964] create_object.isra.0+0x3a/0xa20 [ 2693.575758] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2693.576649] kmem_cache_alloc+0x159/0x310 18:49:19 executing program 1: mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') [ 2693.577386] getname_flags.part.0+0x50/0x4f0 [ 2693.578305] getname_flags+0x9a/0xe0 [ 2693.578969] __x64_sys_rename+0x56/0xa0 [ 2693.579688] do_syscall_64+0x33/0x40 [ 2693.580371] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2693.581285] RIP: 0033:0x7f721cbccb19 [ 2693.581972] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2693.585258] RSP: 002b:00007f721a142188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2693.586226] tmpfs: Unknown parameter '' [ 2693.586658] RAX: ffffffffffffffda RBX: 00007f721ccdff60 RCX: 00007f721cbccb19 [ 2693.586667] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2693.586675] RBP: 00007f721a1421d0 R08: 0000000000000000 R09: 0000000000000000 [ 2693.586684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2693.586692] R13: 00007ffef6b29f6f R14: 00007f721a142300 R15: 0000000000022000 18:49:35 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 3) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:49:35 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, 0x0, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:49:35 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 3) 18:49:35 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) 18:49:35 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') (fail_nth: 4) 18:49:35 executing program 1: r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:49:35 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000300)='mnt/encrypted_dir\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r4}, 0x14) creat(&(0x7f0000000040)='./file1\x00', 0x0) 18:49:35 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) (fail_nth: 4) [ 2709.090359] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2709.091527] FAULT_INJECTION: forcing a failure. [ 2709.091527] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2709.095704] CPU: 1 PID: 11374 Comm: syz-executor.2 Not tainted 5.10.234 #1 [ 2709.097486] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2709.099596] Call Trace: [ 2709.100283] dump_stack+0x107/0x167 [ 2709.101109] FAULT_INJECTION: forcing a failure. [ 2709.101109] name failslab, interval 1, probability 0, space 0, times 0 [ 2709.101210] should_fail.cold+0x5/0xa [ 2709.104817] strncpy_from_user+0x34/0x470 [ 2709.105875] getname_flags.part.0+0x95/0x4f0 [ 2709.106999] getname_flags+0x9a/0xe0 [ 2709.107947] __x64_sys_rename+0x56/0xa0 [ 2709.108973] do_syscall_64+0x33/0x40 [ 2709.109912] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2709.111212] RIP: 0033:0x7f721cbccb19 [ 2709.112176] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2709.116124] RSP: 002b:00007f721a142188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2709.117736] RAX: ffffffffffffffda RBX: 00007f721ccdff60 RCX: 00007f721cbccb19 [ 2709.119245] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2709.120760] RBP: 00007f721a1421d0 R08: 0000000000000000 R09: 0000000000000000 [ 2709.122266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2709.123773] R13: 00007ffef6b29f6f R14: 00007f721a142300 R15: 0000000000022000 [ 2709.125323] CPU: 0 PID: 11384 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2709.127059] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2709.129154] Call Trace: [ 2709.129831] dump_stack+0x107/0x167 [ 2709.130751] should_fail.cold+0x5/0xa [ 2709.131707] ? getname_flags.part.0+0x50/0x4f0 [ 2709.132863] should_failslab+0x5/0x20 [ 2709.133762] kmem_cache_alloc+0x5b/0x310 [ 2709.134616] ? strncpy_from_user+0x9e/0x470 [ 2709.135523] getname_flags.part.0+0x50/0x4f0 [ 2709.136455] user_path_at_empty+0xa1/0x100 [ 2709.137342] __do_sys_pivot_root+0x1c4/0x14b0 [ 2709.138286] ? wait_for_completion_io+0x270/0x270 [ 2709.139300] ? rcu_read_lock_any_held+0x75/0xa0 [ 2709.140279] ? vfs_write+0x354/0xb10 [ 2709.141056] ? is_path_reachable+0x110/0x110 [ 2709.141977] ? ksys_write+0x1a9/0x260 [ 2709.142772] ? __ia32_sys_read+0xb0/0xb0 [ 2709.143625] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2709.144733] do_syscall_64+0x33/0x40 [ 2709.145487] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2709.146560] RIP: 0033:0x7f3f260f0b19 [ 2709.147338] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2709.150467] FAULT_INJECTION: forcing a failure. [ 2709.150467] name failslab, interval 1, probability 0, space 0, times 0 [ 2709.151210] RSP: 002b:00007f3f23666188 EFLAGS: 00000246 ORIG_RAX: 000000000000009b [ 2709.151229] RAX: ffffffffffffffda RBX: 00007f3f26203f60 RCX: 00007f3f260f0b19 [ 2709.151247] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 2709.158113] RBP: 00007f3f236661d0 R08: 0000000000000000 R09: 0000000000000000 [ 2709.159604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2709.161109] R13: 00007ffd98feef9f R14: 00007f3f23666300 R15: 0000000000022000 [ 2709.162631] CPU: 1 PID: 11385 Comm: syz-executor.5 Not tainted 5.10.234 #1 [ 2709.163314] FAULT_INJECTION: forcing a failure. [ 2709.163314] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2709.164116] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2709.164122] Call Trace: [ 2709.164141] dump_stack+0x107/0x167 [ 2709.164160] should_fail.cold+0x5/0xa [ 2709.164175] ? getname_flags.part.0+0x50/0x4f0 [ 2709.164191] ? getname_flags.part.0+0x50/0x4f0 [ 2709.164212] should_failslab+0x5/0x20 [ 2709.164230] kmem_cache_alloc+0x5b/0x310 [ 2709.164247] ? strncpy_from_user+0x9e/0x470 [ 2709.164271] getname_flags.part.0+0x50/0x4f0 [ 2709.175831] getname_flags+0x9a/0xe0 [ 2709.176625] __x64_sys_rename+0x65/0xa0 [ 2709.177462] do_syscall_64+0x33/0x40 [ 2709.178243] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2709.179319] RIP: 0033:0x7f945b569b19 [ 2709.180110] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2709.183975] RSP: 002b:00007f9458adf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2709.185592] RAX: ffffffffffffffda RBX: 00007f945b67cf60 RCX: 00007f945b569b19 [ 2709.187101] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000020000140 [ 2709.188618] RBP: 00007f9458adf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2709.190125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2709.191630] R13: 00007fff3271b00f R14: 00007f9458adf300 R15: 0000000000022000 [ 2709.193167] CPU: 0 PID: 11381 Comm: syz-executor.4 Not tainted 5.10.234 #1 [ 2709.194620] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2709.196360] Call Trace: [ 2709.196904] dump_stack+0x107/0x167 [ 2709.197664] should_fail.cold+0x5/0xa [ 2709.198459] strncpy_from_user+0x34/0x470 [ 2709.199324] getname_flags.part.0+0x95/0x4f0 [ 2709.200249] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2709.201253] user_path_at_empty+0xa1/0x100 [ 2709.202137] path_setxattr+0x95/0x190 [ 2709.202923] ? setxattr+0x330/0x330 [ 2709.203682] __x64_sys_setxattr+0xc0/0x160 [ 2709.204555] do_syscall_64+0x33/0x40 [ 2709.205315] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2709.206364] RIP: 0033:0x7fccd104ab19 [ 2709.207103] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2709.210843] RSP: 002b:00007fccce5c0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 2709.212422] RAX: ffffffffffffffda RBX: 00007fccd115df60 RCX: 00007fccd104ab19 [ 2709.213894] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2709.214069] tmpfs: Unknown parameter '' [ 2709.215350] RBP: 00007fccce5c01d0 R08: 0000000000000000 R09: 0000000000000000 [ 2709.215360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2709.215369] R13: 00007ffe78c2024f R14: 00007fccce5c0300 R15: 0000000000022000 18:49:35 executing program 1: r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:49:35 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)) setresuid(0xffffffffffffffff, 0x0, 0x0) 18:49:35 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, 0x0, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:49:35 executing program 1: r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:49:35 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, @in_args={0x1}}, './mnt\x00'}) finit_module(r2, &(0x7f0000000300)='.!%.\x00', 0x1) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'veth1_macvtap\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r5}, 0x14) [ 2709.360519] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. 18:49:35 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') (fail_nth: 5) 18:49:35 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 4) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2709.409963] tmpfs: Unknown parameter '' 18:49:35 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:49:35 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) (fail_nth: 5) 18:49:35 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)) setresuid(0xffffffffffffffff, 0x0, 0x0) [ 2709.497459] FAULT_INJECTION: forcing a failure. [ 2709.497459] name failslab, interval 1, probability 0, space 0, times 0 [ 2709.499909] CPU: 1 PID: 11403 Comm: syz-executor.5 Not tainted 5.10.234 #1 [ 2709.501531] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2709.504245] Call Trace: [ 2709.504792] dump_stack+0x107/0x167 [ 2709.505542] should_fail.cold+0x5/0xa [ 2709.506332] ? create_object.isra.0+0x3a/0xa20 [ 2709.507295] should_failslab+0x5/0x20 [ 2709.508079] kmem_cache_alloc+0x5b/0x310 [ 2709.509060] create_object.isra.0+0x3a/0xa20 [ 2709.509977] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2709.511089] kmem_cache_alloc+0x159/0x310 [ 2709.511960] ? strncpy_from_user+0x9e/0x470 [ 2709.512865] getname_flags.part.0+0x50/0x4f0 [ 2709.513773] getname_flags+0x9a/0xe0 [ 2709.514550] __x64_sys_rename+0x65/0xa0 [ 2709.515384] do_syscall_64+0x33/0x40 [ 2709.516169] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2709.517226] RIP: 0033:0x7f945b569b19 [ 2709.517989] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2709.519063] FAULT_INJECTION: forcing a failure. [ 2709.519063] name failslab, interval 1, probability 0, space 0, times 0 [ 2709.521815] RSP: 002b:00007f9458adf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2709.521835] RAX: ffffffffffffffda RBX: 00007f945b67cf60 RCX: 00007f945b569b19 [ 2709.521845] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000020000140 [ 2709.521855] RBP: 00007f9458adf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2709.521874] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2709.532292] R13: 00007fff3271b00f R14: 00007f9458adf300 R15: 0000000000022000 [ 2709.533815] CPU: 0 PID: 11411 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2709.535112] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2709.536518] Call Trace: [ 2709.536968] dump_stack+0x107/0x167 [ 2709.537588] should_fail.cold+0x5/0xa [ 2709.538238] ? create_object.isra.0+0x3a/0xa20 [ 2709.538992] should_failslab+0x5/0x20 [ 2709.539730] kmem_cache_alloc+0x5b/0x310 [ 2709.540502] create_object.isra.0+0x3a/0xa20 [ 2709.541331] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2709.542293] kmem_cache_alloc+0x159/0x310 [ 2709.543073] getname_flags.part.0+0x50/0x4f0 [ 2709.543955] user_path_at_empty+0xa1/0x100 [ 2709.544790] __do_sys_pivot_root+0x1c4/0x14b0 [ 2709.545694] ? wait_for_completion_io+0x270/0x270 [ 2709.546674] ? rcu_read_lock_any_held+0x75/0xa0 [ 2709.547586] ? vfs_write+0x354/0xb10 [ 2709.548285] FAULT_INJECTION: forcing a failure. [ 2709.548285] name failslab, interval 1, probability 0, space 0, times 0 [ 2709.548340] ? is_path_reachable+0x110/0x110 [ 2709.552010] ? ksys_write+0x1a9/0x260 [ 2709.552784] ? __ia32_sys_read+0xb0/0xb0 [ 2709.553589] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2709.554629] do_syscall_64+0x33/0x40 [ 2709.555364] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2709.556418] RIP: 0033:0x7f3f260f0b19 [ 2709.557157] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2709.560800] RSP: 002b:00007f3f23666188 EFLAGS: 00000246 ORIG_RAX: 000000000000009b [ 2709.562294] RAX: ffffffffffffffda RBX: 00007f3f26203f60 RCX: 00007f3f260f0b19 [ 2709.563700] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 2709.565077] RBP: 00007f3f236661d0 R08: 0000000000000000 R09: 0000000000000000 [ 2709.566446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2709.567825] R13: 00007ffd98feef9f R14: 00007f3f23666300 R15: 0000000000022000 [ 2709.569257] CPU: 1 PID: 11406 Comm: syz-executor.2 Not tainted 5.10.234 #1 [ 2709.570857] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2709.572698] Call Trace: [ 2709.573287] dump_stack+0x107/0x167 [ 2709.574086] should_fail.cold+0x5/0xa [ 2709.574918] ? getname_flags.part.0+0x50/0x4f0 [ 2709.575923] should_failslab+0x5/0x20 [ 2709.576787] kmem_cache_alloc+0x5b/0x310 [ 2709.577681] ? strncpy_from_user+0x9e/0x470 [ 2709.578657] getname_flags.part.0+0x50/0x4f0 [ 2709.579655] getname_flags+0x9a/0xe0 [ 2709.580524] __x64_sys_rename+0x65/0xa0 [ 2709.581409] do_syscall_64+0x33/0x40 [ 2709.582261] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2709.583410] RIP: 0033:0x7f721cbccb19 [ 2709.584278] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2709.588451] RSP: 002b:00007f721a142188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2709.590182] RAX: ffffffffffffffda RBX: 00007f721ccdff60 RCX: 00007f721cbccb19 [ 2709.591806] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2709.593420] RBP: 00007f721a1421d0 R08: 0000000000000000 R09: 0000000000000000 [ 2709.595041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2709.596686] R13: 00007ffef6b29f6f R14: 00007f721a142300 R15: 0000000000022000 [ 2709.726516] tmpfs: Unknown parameter '' 18:49:50 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)) setresuid(0xffffffffffffffff, 0x0, 0x0) 18:49:50 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') creat(&(0x7f0000000040)='mnt/encrypted_dir\x00', 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r4}, 0x14) 18:49:50 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, 0x0, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:49:50 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) (fail_nth: 6) [ 2724.478554] FAULT_INJECTION: forcing a failure. [ 2724.478554] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2724.479937] CPU: 0 PID: 11428 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2724.480739] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2724.481678] Call Trace: [ 2724.481995] dump_stack+0x107/0x167 [ 2724.482415] should_fail.cold+0x5/0xa [ 2724.482851] strncpy_from_user+0x34/0x470 [ 2724.483335] getname_flags.part.0+0x95/0x4f0 [ 2724.483843] user_path_at_empty+0xa1/0x100 [ 2724.484345] __do_sys_pivot_root+0x1c4/0x14b0 [ 2724.484887] ? wait_for_completion_io+0x270/0x270 [ 2724.485448] ? rcu_read_lock_any_held+0x75/0xa0 [ 2724.485985] ? vfs_write+0x354/0xb10 [ 2724.486415] ? is_path_reachable+0x110/0x110 [ 2724.486922] ? ksys_write+0x1a9/0x260 [ 2724.487357] ? __ia32_sys_read+0xb0/0xb0 [ 2724.487822] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2724.488424] do_syscall_64+0x33/0x40 [ 2724.488863] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2724.489463] RIP: 0033:0x7f3f260f0b19 [ 2724.489900] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2724.492040] RSP: 002b:00007f3f23666188 EFLAGS: 00000246 ORIG_RAX: 000000000000009b [ 2724.492930] RAX: ffffffffffffffda RBX: 00007f3f26203f60 RCX: 00007f3f260f0b19 [ 2724.493763] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 2724.494584] RBP: 00007f3f236661d0 R08: 0000000000000000 R09: 0000000000000000 [ 2724.495406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2724.496238] R13: 00007ffd98feef9f R14: 00007f3f23666300 R15: 0000000000022000 [ 2724.500447] FAULT_INJECTION: forcing a failure. [ 2724.500447] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2724.501807] CPU: 0 PID: 11435 Comm: syz-executor.4 Not tainted 5.10.234 #1 [ 2724.502595] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2724.503563] Call Trace: [ 2724.503870] dump_stack+0x107/0x167 [ 2724.504298] should_fail.cold+0x5/0xa [ 2724.504955] _copy_to_user+0x2e/0x180 [ 2724.505820] simple_read_from_buffer+0xcc/0x160 [ 2724.506799] proc_fail_nth_read+0x198/0x230 [ 2724.507392] ? proc_sessionid_read+0x230/0x230 [ 2724.508054] ? security_file_permission+0xb1/0xe0 [ 2724.508776] ? proc_sessionid_read+0x230/0x230 [ 2724.509444] vfs_read+0x228/0x620 [ 2724.509959] ksys_read+0x12d/0x260 [ 2724.510479] ? vfs_write+0xb10/0xb10 [ 2724.511030] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2724.511786] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2724.512532] do_syscall_64+0x33/0x40 [ 2724.513057] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2724.513791] RIP: 0033:0x7fccd0ffd69c [ 2724.514327] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2724.516750] RSP: 002b:00007fccce5c0170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2724.517765] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fccd0ffd69c [ 2724.518695] RDX: 000000000000000f RSI: 00007fccce5c01e0 RDI: 0000000000000004 [ 2724.519602] RBP: 00007fccce5c01d0 R08: 0000000000000000 R09: 0000000000000000 [ 2724.520551] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2724.520915] FAULT_INJECTION: forcing a failure. [ 2724.520915] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2724.521391] R13: 00007ffe78c2024f R14: 00007fccce5c0300 R15: 0000000000022000 [ 2724.523932] CPU: 1 PID: 11433 Comm: syz-executor.5 Not tainted 5.10.234 #1 18:49:50 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 4) 18:49:50 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') (fail_nth: 6) 18:49:50 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 5) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:49:50 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') [ 2724.524948] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2724.526492] Call Trace: [ 2724.526873] dump_stack+0x107/0x167 [ 2724.527408] should_fail.cold+0x5/0xa [ 2724.527952] strncpy_from_user+0x34/0x470 [ 2724.528568] getname_flags.part.0+0x95/0x4f0 [ 2724.529227] getname_flags+0x9a/0xe0 [ 2724.529776] __x64_sys_rename+0x65/0xa0 [ 2724.530359] do_syscall_64+0x33/0x40 [ 2724.530911] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2724.531661] RIP: 0033:0x7f945b569b19 [ 2724.532213] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2724.534915] RSP: 002b:00007f9458adf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2724.536029] RAX: ffffffffffffffda RBX: 00007f945b67cf60 RCX: 00007f945b569b19 [ 2724.537085] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000020000140 [ 2724.538129] RBP: 00007f9458adf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2724.539166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2724.540212] R13: 00007fff3271b00f R14: 00007f9458adf300 R15: 0000000000022000 18:49:50 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) (fail_nth: 7) [ 2724.549922] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2724.562635] FAULT_INJECTION: forcing a failure. [ 2724.562635] name failslab, interval 1, probability 0, space 0, times 0 [ 2724.565416] CPU: 1 PID: 11430 Comm: syz-executor.2 Not tainted 5.10.234 #1 [ 2724.566955] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2724.568853] Call Trace: [ 2724.569453] dump_stack+0x107/0x167 [ 2724.570273] should_fail.cold+0x5/0xa [ 2724.571122] ? create_object.isra.0+0x3a/0xa20 [ 2724.572146] should_failslab+0x5/0x20 [ 2724.573013] kmem_cache_alloc+0x5b/0x310 [ 2724.573923] create_object.isra.0+0x3a/0xa20 [ 2724.574906] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2724.576062] kmem_cache_alloc+0x159/0x310 [ 2724.577009] ? strncpy_from_user+0x9e/0x470 [ 2724.577978] getname_flags.part.0+0x50/0x4f0 [ 2724.578975] getname_flags+0x9a/0xe0 [ 2724.579824] __x64_sys_rename+0x65/0xa0 [ 2724.580549] FAULT_INJECTION: forcing a failure. [ 2724.580549] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2724.580723] do_syscall_64+0x33/0x40 [ 2724.580752] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2724.584289] RIP: 0033:0x7f721cbccb19 [ 2724.585124] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2724.589291] RSP: 002b:00007f721a142188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2724.590989] RAX: ffffffffffffffda RBX: 00007f721ccdff60 RCX: 00007f721cbccb19 [ 2724.592596] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2724.594201] RBP: 00007f721a1421d0 R08: 0000000000000000 R09: 0000000000000000 [ 2724.595815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2724.597425] R13: 00007ffef6b29f6f R14: 00007f721a142300 R15: 0000000000022000 [ 2724.599076] CPU: 0 PID: 11439 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2724.600106] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2724.601242] Call Trace: [ 2724.601619] dump_stack+0x107/0x167 [ 2724.602123] should_fail.cold+0x5/0xa [ 2724.602656] _copy_to_user+0x2e/0x180 [ 2724.603187] simple_read_from_buffer+0xcc/0x160 [ 2724.603834] proc_fail_nth_read+0x198/0x230 [ 2724.604435] ? proc_sessionid_read+0x230/0x230 [ 2724.605075] ? security_file_permission+0xb1/0xe0 [ 2724.605746] ? proc_sessionid_read+0x230/0x230 [ 2724.606381] vfs_read+0x228/0x620 [ 2724.606874] ksys_read+0x12d/0x260 [ 2724.607355] ? vfs_write+0xb10/0xb10 [ 2724.607896] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2724.609273] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2724.610738] do_syscall_64+0x33/0x40 [ 2724.611766] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2724.613197] RIP: 0033:0x7f3f260a369c [ 2724.614218] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2724.619278] RSP: 002b:00007f3f23666170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2724.621000] tmpfs: Unknown parameter '' [ 2724.621391] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f3f260a369c [ 2724.621408] RDX: 000000000000000f RSI: 00007f3f236661e0 RDI: 0000000000000004 [ 2724.621432] RBP: 00007f3f236661d0 R08: 0000000000000000 R09: 0000000000000000 [ 2724.628551] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2724.630242] R13: 00007ffd98feef9f R14: 00007f3f23666300 R15: 0000000000022000 18:49:50 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) 18:49:50 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:49:50 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file1\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465640e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r5}, 0x14) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x20, 0x0, 0x1, 0x0, 0x0, {0x16}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0x20}}, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000700)={0x134, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x120, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xe3, 0x4, "3d707a9607ac09e884e17ce091688371fcc19fe89f7f890ea355b5b82f8cf62a32eae73971ad93dad474f3630406f7e59be7865673f1bd1e5ae2530129ae830edea07e0ec24cc6cf3cd13f4dcfd14859ce746e88e2b2060a500e90755488b2327515d07b92d07c08f946dc99904ea96ed96aeb1ad8d991b1cecda4df6a42309472f510e27475e475752186a140b9756459268e883fa6829a93278720928bcc18fd443f958b825357e1189a9a83398933e892689b2c963e0513e76a2974d48cd2cb27b419a6e3c7cca699d6be23e83bab3dfea3e467b16f6a33bf2b1d4163d9"}, @ETHTOOL_A_BITSET_BITS={0x24, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'fsuuid'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xf69}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x8005}, 0x10) 18:49:51 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:49:51 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x2, 0x0) 18:49:51 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:49:51 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') (fail_nth: 7) [ 2724.820536] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2724.833116] FAULT_INJECTION: forcing a failure. [ 2724.833116] name failslab, interval 1, probability 0, space 0, times 0 [ 2724.835896] CPU: 1 PID: 11455 Comm: syz-executor.5 Not tainted 5.10.234 #1 [ 2724.837468] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2724.839326] Call Trace: [ 2724.839917] dump_stack+0x107/0x167 [ 2724.840743] should_fail.cold+0x5/0xa [ 2724.841607] ? __d_alloc+0x2a/0x990 [ 2724.842429] should_failslab+0x5/0x20 [ 2724.843289] kmem_cache_alloc+0x5b/0x310 [ 2724.844190] ? __d_lookup+0x3bf/0x760 [ 2724.845055] __d_alloc+0x2a/0x990 [ 2724.845842] d_alloc+0x46/0x1c0 [ 2724.846576] __lookup_hash+0xcc/0x190 [ 2724.847427] do_renameat2+0x498/0xbf0 [ 2724.848304] ? __ia32_sys_link+0x80/0x80 [ 2724.849224] ? __virt_addr_valid+0x170/0x5d0 [ 2724.850203] ? __check_object_size+0x319/0x440 [ 2724.851224] ? getname_flags.part.0+0x1dd/0x4f0 [ 2724.852272] __x64_sys_rename+0x7d/0xa0 [ 2724.853164] do_syscall_64+0x33/0x40 [ 2724.854009] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2724.855147] RIP: 0033:0x7f945b569b19 [ 2724.855981] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2724.860103] RSP: 002b:00007f9458adf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2724.861799] RAX: ffffffffffffffda RBX: 00007f945b67cf60 RCX: 00007f945b569b19 [ 2724.863370] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000020000140 [ 2724.864939] RBP: 00007f9458adf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2724.866521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2724.868096] R13: 00007fff3271b00f R14: 00007f9458adf300 R15: 0000000000022000 18:49:51 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:49:51 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 6) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2724.971158] FAULT_INJECTION: forcing a failure. [ 2724.971158] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2724.972584] CPU: 0 PID: 11464 Comm: syz-executor.2 Not tainted 5.10.234 #1 [ 2724.973379] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2724.974314] Call Trace: [ 2724.974613] dump_stack+0x107/0x167 [ 2724.975026] should_fail.cold+0x5/0xa [ 2724.975472] strncpy_from_user+0x34/0x470 [ 2724.975944] getname_flags.part.0+0x95/0x4f0 [ 2724.976456] getname_flags+0x9a/0xe0 [ 2724.977029] __x64_sys_rename+0x65/0xa0 [ 2724.977506] do_syscall_64+0x33/0x40 [ 2724.977928] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2724.978513] RIP: 0033:0x7f721cbccb19 [ 2724.978943] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2724.981052] RSP: 002b:00007f721a142188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2724.981934] RAX: ffffffffffffffda RBX: 00007f721ccdff60 RCX: 00007f721cbccb19 [ 2724.982757] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2724.983572] RBP: 00007f721a1421d0 R08: 0000000000000000 R09: 0000000000000000 [ 2724.984382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2724.985197] R13: 00007ffef6b29f6f R14: 00007f721a142300 R15: 0000000000022000 18:50:06 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:50:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 7) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:50:06 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') (fail_nth: 8) 18:50:06 executing program 0: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, 0x0, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:50:06 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:50:06 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x8, 0x0) 18:50:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) getgroups(0x5, &(0x7f0000000300)=[0xee00, 0xffffffffffffffff, 0xee01, 0xee01, 0xee01]) chown(&(0x7f0000000040)='./mnt\x00', r3, r4) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',dfltuid=', @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=r5, @ANYBLOB=',smackfsroot=\x00,measure,Ksuuid=75d1fb27-7ab5-2c03-5304-afcb01cf,\x00']) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="f40900737465642e00f382c0556a132af1f5692186e1a2edd4fd783511e40ca1eb4a48d21bbfccc479c075dfcf646647c6d4b51e397e7587940595b74afc0a9e5c1385397cf7cb6771"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r6}, 0x14) 18:50:06 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') [ 2739.760966] FAULT_INJECTION: forcing a failure. [ 2739.760966] name failslab, interval 1, probability 0, space 0, times 0 [ 2739.762552] CPU: 0 PID: 11473 Comm: syz-executor.5 Not tainted 5.10.234 #1 [ 2739.763511] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2739.764607] Call Trace: [ 2739.764974] dump_stack+0x107/0x167 [ 2739.765471] should_fail.cold+0x5/0xa [ 2739.765981] ? create_object.isra.0+0x3a/0xa20 [ 2739.766615] should_failslab+0x5/0x20 [ 2739.767145] kmem_cache_alloc+0x5b/0x310 [ 2739.767712] create_object.isra.0+0x3a/0xa20 [ 2739.768300] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2739.769001] kmem_cache_alloc+0x159/0x310 [ 2739.769584] ? __d_lookup+0x3bf/0x760 [ 2739.770122] __d_alloc+0x2a/0x990 [ 2739.770592] d_alloc+0x46/0x1c0 [ 2739.771045] __lookup_hash+0xcc/0x190 [ 2739.771555] do_renameat2+0x498/0xbf0 [ 2739.772090] ? __ia32_sys_link+0x80/0x80 [ 2739.772637] ? __virt_addr_valid+0x170/0x5d0 [ 2739.773251] ? __check_object_size+0x319/0x440 [ 2739.773870] ? getname_flags.part.0+0x1dd/0x4f0 [ 2739.774511] __x64_sys_rename+0x7d/0xa0 [ 2739.775041] do_syscall_64+0x33/0x40 [ 2739.775537] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2739.776237] RIP: 0033:0x7f945b569b19 [ 2739.776733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2739.779183] RSP: 002b:00007f9458adf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2739.780221] RAX: ffffffffffffffda RBX: 00007f945b67cf60 RCX: 00007f945b569b19 [ 2739.781214] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000020000140 [ 2739.782188] RBP: 00007f9458adf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2739.783135] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2739.784099] R13: 00007fff3271b00f R14: 00007f9458adf300 R15: 0000000000022000 [ 2739.811454] FAULT_INJECTION: forcing a failure. [ 2739.811454] name failslab, interval 1, probability 0, space 0, times 0 [ 2739.814635] CPU: 1 PID: 11481 Comm: syz-executor.2 Not tainted 5.10.234 #1 [ 2739.816250] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2739.818128] Call Trace: [ 2739.818729] dump_stack+0x107/0x167 [ 2739.819571] should_fail.cold+0x5/0xa [ 2739.820442] ? jbd2__journal_start+0x190/0x7e0 [ 2739.821491] should_failslab+0x5/0x20 [ 2739.822359] kmem_cache_alloc+0x5b/0x310 [ 2739.823278] ? ext4_dx_find_entry+0x600/0x600 [ 2739.824421] jbd2__journal_start+0x190/0x7e0 [ 2739.825453] __ext4_journal_start_sb+0x214/0x390 [ 2739.826527] ext4_rename+0x96d/0x2bc0 [ 2739.827398] ? ext4_tmpfile+0x440/0x440 [ 2739.828308] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2739.829535] ? lock_acquire+0x197/0x470 [ 2739.830448] ? vfs_rename+0xc68/0x1510 [ 2739.831352] ? lockref_get+0x11/0x50 [ 2739.832193] ? find_held_lock+0x2c/0x110 [ 2739.833162] ? down_write+0xe0/0x160 [ 2739.834033] ext4_rename2+0x1af/0x240 [ 2739.834916] vfs_rename+0xd6c/0x1510 [ 2739.835787] ? vfs_unlink+0x8b0/0x8b0 [ 2739.836671] ? lookup_dcache+0x65/0x130 [ 2739.837607] do_renameat2+0xae1/0xbf0 [ 2739.838493] ? __ia32_sys_link+0x80/0x80 [ 2739.839441] ? __virt_addr_valid+0x170/0x5d0 [ 2739.840449] ? __check_object_size+0x319/0x440 [ 2739.841549] __x64_sys_rename+0x7d/0xa0 [ 2739.842459] do_syscall_64+0x33/0x40 [ 2739.843322] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2739.844486] RIP: 0033:0x7f721cbccb19 [ 2739.845334] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:50:06 executing program 6: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x13) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/slabinfo\x00', 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST2(r1, 0x40383d0c, &(0x7f0000000140)={{0x1000003fc, 0x6}, {0x7ff, 0x807}, 0x4}) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) [ 2739.849532] RSP: 002b:00007f721a142188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2739.851536] RAX: ffffffffffffffda RBX: 00007f721ccdff60 RCX: 00007f721cbccb19 [ 2739.853171] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2739.854801] RBP: 00007f721a1421d0 R08: 0000000000000000 R09: 0000000000000000 [ 2739.856438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2739.858063] R13: 00007ffef6b29f6f R14: 00007f721a142300 R15: 0000000000022000 [ 2739.861178] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2739.878655] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.0'. 18:50:22 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:50:22 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 8) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:50:22 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000700)={0x0, 0x0}) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) perf_event_open(&(0x7f0000000440)={0x4, 0x80, 0x2e, 0x3, 0x9b, 0x81, 0x0, 0xfffffffffffffffe, 0x80403, 0xa, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x100, 0x2, @perf_config_ext={0x0, 0x2}, 0x300, 0x3, 0x10000, 0x0, 0x8, 0x10000000, 0x7, 0x0, 0x8000, 0x0, 0xff}, r4, 0xc, r5, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r6}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r7}, 0x14) 18:50:22 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(0x0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:50:22 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') (fail_nth: 9) 18:50:22 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x21, 0x0) 18:50:22 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) openat(r0, &(0x7f00000000c0)='./file1\x00', 0x300, 0x4) [ 2756.702973] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. 18:50:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) [ 2756.723944] FAULT_INJECTION: forcing a failure. [ 2756.723944] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2756.725277] CPU: 0 PID: 11503 Comm: syz-executor.5 Not tainted 5.10.234 #1 [ 2756.726073] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2756.727015] Call Trace: [ 2756.727331] dump_stack+0x107/0x167 [ 2756.727758] should_fail.cold+0x5/0xa [ 2756.728200] _copy_to_user+0x2e/0x180 [ 2756.728654] simple_read_from_buffer+0xcc/0x160 [ 2756.729197] proc_fail_nth_read+0x198/0x230 [ 2756.729697] ? proc_sessionid_read+0x230/0x230 [ 2756.730224] ? security_file_permission+0xb1/0xe0 [ 2756.730772] ? proc_sessionid_read+0x230/0x230 [ 2756.731298] vfs_read+0x228/0x620 [ 2756.731696] ksys_read+0x12d/0x260 [ 2756.732112] ? vfs_write+0xb10/0xb10 [ 2756.732539] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2756.733141] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2756.733738] do_syscall_64+0x33/0x40 [ 2756.734229] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2756.734893] RIP: 0033:0x7f945b51c69c [ 2756.735379] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2756.737823] RSP: 002b:00007f9458adf170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2756.738801] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f945b51c69c [ 2756.739762] RDX: 000000000000000f RSI: 00007f9458adf1e0 RDI: 0000000000000004 [ 2756.740719] RBP: 00007f9458adf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2756.741667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2756.742589] R13: 00007fff3271b00f R14: 00007f9458adf300 R15: 0000000000022000 [ 2756.751567] FAULT_INJECTION: forcing a failure. [ 2756.751567] name failslab, interval 1, probability 0, space 0, times 0 [ 2756.753232] CPU: 0 PID: 11508 Comm: syz-executor.2 Not tainted 5.10.234 #1 [ 2756.754113] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2756.755145] Call Trace: [ 2756.755487] dump_stack+0x107/0x167 [ 2756.755993] should_fail.cold+0x5/0xa [ 2756.756504] ? create_object.isra.0+0x3a/0xa20 [ 2756.757076] should_failslab+0x5/0x20 [ 2756.757533] kmem_cache_alloc+0x5b/0x310 [ 2756.758057] ? __ext4_find_entry+0x85b/0xfc0 [ 2756.758632] ? __ext4_find_entry+0x9f1/0xfc0 [ 2756.759229] create_object.isra.0+0x3a/0xa20 [ 2756.759784] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2756.760422] kmem_cache_alloc+0x159/0x310 [ 2756.760939] ? ext4_dx_find_entry+0x600/0x600 [ 2756.761501] jbd2__journal_start+0x190/0x7e0 [ 2756.762073] __ext4_journal_start_sb+0x214/0x390 [ 2756.762646] ext4_rename+0x96d/0x2bc0 [ 2756.763073] ? ext4_tmpfile+0x440/0x440 [ 2756.763515] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2756.764111] ? lock_acquire+0x197/0x470 [ 2756.764558] ? vfs_rename+0xc68/0x1510 [ 2756.764992] ? lockref_get+0x11/0x50 [ 2756.765412] ? find_held_lock+0x2c/0x110 [ 2756.765891] ? down_write+0xe0/0x160 [ 2756.766373] ext4_rename2+0x1af/0x240 [ 2756.766865] vfs_rename+0xd6c/0x1510 [ 2756.767342] ? vfs_unlink+0x8b0/0x8b0 [ 2756.767852] ? lookup_dcache+0x65/0x130 [ 2756.768400] do_renameat2+0xae1/0xbf0 [ 2756.768928] ? __ia32_sys_link+0x80/0x80 [ 2756.769489] ? __virt_addr_valid+0x170/0x5d0 [ 2756.770079] ? __check_object_size+0x319/0x440 [ 2756.770734] __x64_sys_rename+0x7d/0xa0 [ 2756.771274] do_syscall_64+0x33/0x40 [ 2756.771783] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2756.772475] RIP: 0033:0x7f721cbccb19 [ 2756.772983] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2756.775424] RSP: 002b:00007f721a142188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2756.776460] RAX: ffffffffffffffda RBX: 00007f721ccdff60 RCX: 00007f721cbccb19 [ 2756.777432] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2756.778404] RBP: 00007f721a1421d0 R08: 0000000000000000 R09: 0000000000000000 [ 2756.779371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2756.780340] R13: 00007ffef6b29f6f R14: 00007f721a142300 R15: 0000000000022000 18:50:23 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 2756.806201] FAULT_INJECTION: forcing a failure. [ 2756.806201] name failslab, interval 1, probability 0, space 0, times 0 [ 2756.810001] CPU: 1 PID: 11512 Comm: syz-executor.0 Not tainted 5.10.234 #1 18:50:23 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') [ 2756.811921] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2756.814544] Call Trace: [ 2756.815324] dump_stack+0x107/0x167 [ 2756.816400] should_fail.cold+0x5/0xa [ 2756.817526] ? getname_flags.part.0+0x50/0x4f0 [ 2756.818886] should_failslab+0x5/0x20 [ 2756.820007] kmem_cache_alloc+0x5b/0x310 18:50:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x60ff, 0x0) [ 2756.821211] getname_flags.part.0+0x50/0x4f0 [ 2756.822562] getname_flags+0x9a/0xe0 [ 2756.823576] do_mkdirat+0x8f/0x2b0 [ 2756.824529] ? user_path_create+0xf0/0xf0 [ 2756.825642] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2756.827056] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2756.828435] do_syscall_64+0x33/0x40 [ 2756.829430] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2756.830811] RIP: 0033:0x7f371d026b19 [ 2756.831807] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2756.836731] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2756.838772] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 2756.840730] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2756.842672] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2756.844582] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2756.846665] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 18:50:23 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x108) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000100)=@v1={0x0, @aes128, 0x0, @desc2}) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\xe3U\xa7j\x11\xa1\xbe\x18'}, {0x20, '\xe3U\xa7j\x11\xa1\xbe\x18'}, {0x20, '/dev/bsg\x00'}, {0x20, '\''}, {0x20, '/dev/bsg\x00'}, {0x20, '{\xcf+u'}, {0x20, '/dev/bsg\x00'}], 0xa, "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"}, 0x1042) 18:50:23 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 9) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2756.916853] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. 18:50:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x80000, 0x0) 18:50:23 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(0x0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:50:23 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00', 0x200, 0x25) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='nilfs2\x00', 0x20000, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') [ 2756.996118] FAULT_INJECTION: forcing a failure. [ 2756.996118] name failslab, interval 1, probability 0, space 0, times 0 [ 2756.999087] CPU: 1 PID: 11527 Comm: syz-executor.2 Not tainted 5.10.234 #1 [ 2757.000689] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2757.002638] Call Trace: [ 2757.003260] dump_stack+0x107/0x167 [ 2757.004112] should_fail.cold+0x5/0xa [ 2757.005002] ? create_object.isra.0+0x3a/0xa20 [ 2757.006075] should_failslab+0x5/0x20 [ 2757.006953] kmem_cache_alloc+0x5b/0x310 [ 2757.007887] ? __memset+0x29/0x40 [ 2757.008690] create_object.isra.0+0x3a/0xa20 [ 2757.009697] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2757.010885] kmem_cache_alloc+0x159/0x310 [ 2757.011839] ? ext4_dx_find_entry+0x600/0x600 [ 2757.012877] jbd2__journal_start+0x190/0x7e0 [ 2757.013912] __ext4_journal_start_sb+0x214/0x390 [ 2757.015010] ext4_rename+0x96d/0x2bc0 [ 2757.015897] ? ext4_tmpfile+0x440/0x440 [ 2757.016815] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2757.018048] ? lock_acquire+0x197/0x470 [ 2757.018960] ? vfs_rename+0xc68/0x1510 [ 2757.019874] ? lockref_get+0x11/0x50 [ 2757.020728] ? find_held_lock+0x2c/0x110 [ 2757.021679] ? down_write+0xe0/0x160 [ 2757.022562] ext4_rename2+0x1af/0x240 [ 2757.023444] vfs_rename+0xd6c/0x1510 [ 2757.024309] ? vfs_unlink+0x8b0/0x8b0 [ 2757.025196] ? lookup_dcache+0x65/0x130 [ 2757.026133] do_renameat2+0xae1/0xbf0 [ 2757.027024] ? __ia32_sys_link+0x80/0x80 [ 2757.027972] ? __virt_addr_valid+0x170/0x5d0 [ 2757.028985] ? __check_object_size+0x319/0x440 [ 2757.030088] __x64_sys_rename+0x7d/0xa0 [ 2757.031004] do_syscall_64+0x33/0x40 18:50:23 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000a00)='./mnt\x00', 0x185000, 0x186) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6=@empty, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@private}}, &(0x7f0000000a40)=0xe8) pwritev(0xffffffffffffffff, &(0x7f0000000d80)=[{&(0x7f0000000500)="2903977de2148e239b36efe2607b25ce9da81d7d2059a01f467962e1f231402c3f99eb49b78dd2fa4104096ae51184f8215cef2ec332d7521d748b5640323ea2482a03", 0x43}, {&(0x7f0000000b80)="75eba4da55a8464f1d246b0c2a8ba252d85b6a7891fdcd6d84cdd0f00e9e531aa6191b23256ebdebfc8ef93297722e722cd6f6883cbed95d27f02797b24e34d43bd2027d924d889a0a27fd55cd93d2b80c0771326c6e6e74f257794dcce29573ea4f16c4300618178684ee453fd5bea2f6a6862f036a70951595e6d71251b97e32026e3a4966883ca8859a91545469b7bf54654cec35daa003a1a47f9e2d04054ce9d2138a8816", 0xa7}, {&(0x7f0000000c40)="2f5cb28a7e47379c6a6243092ddf3149c451e8e9690fc005a91134c61f78de2fa912bc2af031b13ad1ed4ad3ba32c20c28ba73ca1db0267a6d1beb7edecd267ff164df4b59911db253af0b58c0a8329142c25b13029c765f709e3a95b888344a8e687615345d28846240b2a222530253cd482a3da1b7c19a6b8c327810453670e95fc54a561a632066b6cd467c75a485e7de8659d8a436ea7170de1ab8ae619277", 0xa1}, {&(0x7f0000000580)="117c7845699180cf3587c8f2c21fb7cc0f4511cd7f253d0d924af0a0051e", 0x1e}, {&(0x7f0000000d00)="11dcc290f3f0d0fc783339f08d13f8489aa62c920b6d3e022d49efc8a07c84d0276a3a2a20d2129e7f1ebebd4cf943fafa069b429787d291f7ef1d39790c3580b816dd74555dc1f2af4baa4189f1d4425e9d3153f6a9702f902a0f5e00e1817406074986611ecc67e50206167c234fd380ae890ac06fda434801", 0x7a}], 0x5, 0xfffff953, 0x1) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000300)='mnt/encrypted_dir\x00', 0x200, 0x2, &(0x7f0000000600)=[{&(0x7f0000000440)="7d9c2fd9e2df3dbf5a43f0ef9faf5d6c799e84b8041de5f8cd22028482b50285011761461c5012685237978a3a5d1166aacb511879afb34e4b38be46b5f3dd13090a68fa39", 0x45, 0x9}, {&(0x7f0000000700)="ddfbc3e085d27d1471fedd8adc17c8a95f981212b7b60a9bfaf37b4ba4bf31bf5b79df577c0c45643bee6fc50068550f49fc8bb73156f2458fe369b5de9cc49e0a9b8e9e43b01e1a7b2aa0c5d98074f82b28dbdb52cef96092e9d1ab3213cfce6e6d76fe33915d58911ebb85fea8a1d57ff728ebcff6a36ee2596305d08d8a680ba9daec0b219fec5f826fb97e355c2b537bf6ea7ddd39415e8f0861d2ebbbeb68214d8420f24ce4f7699333fca38f1b231e1971fdc8e7ea807718fd26d0deeb5520a5a17496772f183b961ed434d4bbea5537444d576d9b84ba4ab2981289a554effa9cbe1b096ba46965351b8c79f4921cdb", 0xf3, 0x9}], 0x8, &(0x7f0000000940)={[{@utf8no}, {@shortname_win95}, {@rodir}, {@nonumtail}, {@utf8}], [{@pcr={'pcr', 0x3d, 0x25}}, {@uid_lt={'uid<', r0}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000a80)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="c937800c7766642e6f3d", @ANYRESHEX=r2, @ANYBLOB=',dfltuid=', @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=r5, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d1fb27-7ab4-2c03-5304-afcb01cf,\x00']) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="51ea85907465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r6}, 0x14) [ 2757.031863] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2757.033257] RIP: 0033:0x7f721cbccb19 [ 2757.034129] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2757.038352] RSP: 002b:00007f721a142188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2757.040104] RAX: ffffffffffffffda RBX: 00007f721ccdff60 RCX: 00007f721cbccb19 18:50:23 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000340)=""/188, 0xbc, 0x1000, &(0x7f00000002c0)=@qipcrtr={0x2a, 0xffffffff, 0x4000}, 0x80) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') [ 2757.041816] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2757.043661] RBP: 00007f721a1421d0 R08: 0000000000000000 R09: 0000000000000000 [ 2757.045818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2757.047591] R13: 00007ffef6b29f6f R14: 00007f721a142300 R15: 0000000000022000 18:50:23 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(0x0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') [ 2757.064438] tmpfs: Unknown parameter '' 18:50:36 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0xf0ff1f, 0x0) 18:50:36 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) getsockopt$netlink(r5, 0x10e, 0x7, &(0x7f00000004c0)=""/160, &(0x7f0000000000)=0xa0) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000380)={'wlan0\x00'}) poll(&(0x7f00000000c0)=[{r1, 0x10}, {r0, 0xc0}, {r2}, {r3, 0x8480}, {r0, 0x3040}, {r4, 0x108}, {r5, 0x2}], 0x7, 0x7) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:50:36 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:50:36 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:50:36 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x2000002, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') 18:50:36 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:50:36 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r6, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[], 0x30}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd_index, 0x0, 0x0}, 0x80000001) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_FSYNC={0x3, 0x3, 0x0, @fd=r0, 0x0, 0x0, 0x0, 0x2fb4687ae86d17c7, 0x1}, 0xcdb5) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r5}, 0x14) 18:50:36 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') [ 2770.366486] FAULT_INJECTION: forcing a failure. [ 2770.366486] name failslab, interval 1, probability 0, space 0, times 0 [ 2770.369494] CPU: 0 PID: 11556 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 2770.370922] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2770.372607] Call Trace: [ 2770.373156] dump_stack+0x107/0x167 [ 2770.373894] should_fail.cold+0x5/0xa [ 2770.374676] ? create_object.isra.0+0x3a/0xa20 [ 2770.375614] should_failslab+0x5/0x20 [ 2770.376391] kmem_cache_alloc+0x5b/0x310 [ 2770.377224] ? ksys_write+0x21a/0x260 [ 2770.377996] create_object.isra.0+0x3a/0xa20 [ 2770.378906] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2770.379941] kmem_cache_alloc+0x159/0x310 [ 2770.380788] getname_flags.part.0+0x50/0x4f0 [ 2770.381079] FAULT_INJECTION: forcing a failure. [ 2770.381079] name failslab, interval 1, probability 0, space 0, times 0 [ 2770.381681] getname_flags+0x9a/0xe0 [ 2770.381700] do_mkdirat+0x8f/0x2b0 [ 2770.381718] ? user_path_create+0xf0/0xf0 [ 2770.381742] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2770.381760] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2770.381778] do_syscall_64+0x33/0x40 [ 2770.381796] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2770.381808] RIP: 0033:0x7f371d026b19 [ 2770.381824] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2770.381843] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2770.381862] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 2770.399356] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2770.400880] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2770.402373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2770.403843] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 [ 2770.405361] CPU: 1 PID: 11559 Comm: syz-executor.2 Not tainted 5.10.234 #1 [ 2770.407166] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2770.409315] Call Trace: [ 2770.410015] dump_stack+0x107/0x167 [ 2770.410982] should_fail.cold+0x5/0xa [ 2770.411977] ? jbd2__journal_start+0x190/0x7e0 [ 2770.413174] should_failslab+0x5/0x20 [ 2770.414171] kmem_cache_alloc+0x5b/0x310 [ 2770.415254] jbd2__journal_start+0x190/0x7e0 [ 2770.416419] __ext4_journal_start_sb+0x214/0x390 [ 2770.417665] ext4_evict_inode+0x8f4/0x1a60 [ 2770.418807] ? ext4_da_write_begin+0xd40/0xd40 [ 2770.419992] ? rwlock_bug.part.0+0x90/0x90 [ 2770.421109] ? ext4_da_write_begin+0xd40/0xd40 [ 2770.422305] evict+0x32b/0x8c0 [ 2770.423142] ? new_inode+0x250/0x250 [ 2770.424240] ? lock_downgrade+0x6d0/0x6d0 [ 2770.425486] ? rwlock_bug.part.0+0x90/0x90 [ 2770.426787] ? fsnotify_grab_connector+0x11a/0x250 [ 2770.428300] iput.part.0+0x4b9/0x6d0 [ 2770.429434] ? trace_event_raw_event_ext4_es_lookup_extent_enter+0x300/0x300 [ 2770.431600] iput+0x58/0x70 [ 2770.432508] dentry_unlink_inode+0x2bb/0x470 [ 2770.433845] __dentry_kill+0x36f/0x5c0 [ 2770.435050] ? dput+0x35/0xcd0 [ 2770.436032] dput+0x6f4/0xcd0 [ 2770.436997] do_renameat2+0x715/0xbf0 [ 2770.438170] ? __ia32_sys_link+0x80/0x80 [ 2770.439446] ? __virt_addr_valid+0x170/0x5d0 [ 2770.440774] ? __check_object_size+0x319/0x440 [ 2770.442239] __x64_sys_rename+0x7d/0xa0 [ 2770.443454] do_syscall_64+0x33/0x40 [ 2770.444582] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2770.446137] RIP: 0033:0x7f721cbccb19 [ 2770.447280] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2770.452824] RSP: 002b:00007f721a142188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2770.455134] RAX: ffffffffffffffda RBX: 00007f721ccdff60 RCX: 00007f721cbccb19 [ 2770.457312] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2770.459485] RBP: 00007f721a1421d0 R08: 0000000000000000 R09: 0000000000000000 [ 2770.461644] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2770.463810] R13: 00007ffef6b29f6f R14: 00007f721a142300 R15: 0000000000022000 [ 2770.469132] EXT4-fs error (device sda) in ext4_evict_inode:257: Out of memory [ 2770.489151] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. 18:50:36 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') 18:50:36 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:50:36 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x1000000, 0x0) 18:50:36 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) utimensat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {r1, r2/1000+60000}}, 0x0) move_mount(r0, &(0x7f0000000180)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00', 0x60) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:50:36 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') [ 2770.583020] tmpfs: Unknown parameter '' 18:50:36 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 2770.675032] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. 18:50:51 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x2000000, 0x0) 18:50:51 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f0000000700)) chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r5}, 0x14) 18:50:51 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 11) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:50:51 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 3) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:50:51 executing program 6: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080), 0x200, 0xc2000) ioctl$sock_bt_hci(r1, 0x0, &(0x7f0000000100)="a65dbef7b89b18ab") pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:50:51 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)) setresuid(0xffffffffffffffff, 0x0, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:50:51 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:50:51 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0/file0/file0\x00', 0x8, 0x3, &(0x7f0000000500)=[{&(0x7f0000000200)="8eeec4c0b8739135a647ee9b4f45b5a698ce2be2a1fa99b7ba9b6e64758bf2187707752ea82f6d4efb4a0dade7536f6b621f0cca32d7c5452de2dd929ef632c8a6a026b3fedef74657e92b10e18ae0a98316e56bdf1c33124a107c7e50b1dd05985a27817efbe0341d52e0118f59c7fca37c03270d2eac15bc528e02cbac46efb09d40b1a064f33a6433c62cf44d431c79d80af32af803c10b310688a190112c0ec58f9f80952a7e1cc4783bf57a198a8b5595157aead202a821158ccca452eb353d2c1aad080b9ca39b9c83cf51dbe16b5f817a63b8c76c6d1dd296ff212b60f72d848b1b2e0240b5672a60", 0xec, 0x3}, {&(0x7f0000000300)="454a22bb2d766ece33c4df683d4e09406b698670666b970280ea4a769fbafa42e8df2996cb29bfefe693e5dd174d6b8d9b46e3372f9b5af1fe19aeaf8d6854c95c62972138c16f18b908f516c24b136c7c8b19d04b4b9af0baaea1cfddb7a4c1c838fcb972a5a73094bbfc527f399771654ba74157e5d247815e8ea95c11e854fb59aa031a5dc70da4bc9775a7139d1fab4f46c4d1b1350b991941f45084294cae4a9198d2a75a8ba46aeb757b77b8a9ceb227c216e2132194f87d44461a3e2f151807db4a86960a2a693f7b85", 0xcd, 0x81}, {&(0x7f0000000400)="4dc208a4af4c4df4cef7998a5e3c13e07f6ffd257cbfa94dd61c7633e98db76f84d8aadeb2ee10b135c083afdf55a0004adc1be325dd584a21516e9cf6b8c452c1de272ef2d4e6949492efd382f37fac561ae1d729e2673cfa4abd34d0f7099bf894237652866ccfc0fa9d26a2b2528c277656acedfefd1173c8c1345444739db74e413d0eea0d966f4633bacdd337c73ea0c54a868d5dcc7c65793cc93160ba944380d970a2eb4e65791260e55efcf35437bc0d51a720648716fd2bc6f8fe646a74f4f82c02d7c61f675182148bf1b48ec7a9904b099bf1abdc4a8c42d7f0bb", 0xe0, 0x200}], 0x46040, &(0x7f0000000580)=ANY=[@ANYBLOB="646174613d6a3adc726e616c2c61756469742c66756e633d504f4c4943595f434845434b2c646fb7745f61707072616973652c7063723d3030303030303030303030303030303032362c00"]) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r1}, '\x00'}) mkdirat(r3, &(0x7f0000000700)='./file0/file0\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1, {0xee00, 0xee00}}, './file0\x00'}) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) getgroups(0x6, &(0x7f0000000680)=[0xee00, 0xffffffffffffffff, 0xee00, 0x0, 0x0, 0x0]) r7 = getegid() r8 = syz_mount_image$iso9660(&(0x7f0000000800), &(0x7f0000000840)='./file0/file0/file0\x00', 0x8, 0x2, &(0x7f00000009c0)=[{&(0x7f0000000880)="0160785b641f33c127d5954b1299d7782d3019822578123ffad9a43594c3cc8db17c207e6ca3c08a218f56", 0x2b, 0x4}, {&(0x7f00000008c0)="45fa30bc749da512df50d84d7b832cbcb471777fda87fb7b7ca459976ca5861aa9371fe3bebf8266e19cc78d8555beb9fe8111636303faea476d64ea98554282c6aeaa35e46cfbe3e2ece337b820ae7c7b1250bfc01c7ba5916e68377dbe34356381b0bc406d5d311a2bd1a0a02d4174af3f0f88dff8f2540bbc69ecf0bdca799b4a5553fb0158c9ac659c907fe061a9976cb5f4ad096b61cc9a01299876997acc7ca0c877d89dd615145fe8195bce1c62f12ebb70fd07418f6d540fbf5632124ec07cd4e09f46df0b5f97cef59e32e97525d0554c9ff5f1c3f7df1b9015989067ff410f12b9694de2de280a8f891042e333dd3d81a8b3", 0xf7, 0x7}], 0x94540687ef93f766, &(0x7f0000000a00)={[{@map_acorn}, {@map_normal}, {@mode={'mode', 0x3d, 0x4}}, {@uid={'uid', 0x3d, r4}}, {@unhide}, {@dmode={'dmode', 0x3d, 0x18}}, {@session={'session', 0x3d, 0x10}}, {@block}], [{@permit_directio}, {@appraise_type}, {@dont_hash}, {@appraise_type}]}) open_tree(r8, &(0x7f0000000b00)='./file0/file0\x00', 0x1) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x242c, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}, {@afid={'afid', 0x3d, 0xe8e8}}, {}, {@afid={'afid', 0x3d, 0x4}}, {@dfltgid={'dfltgid', 0x3d, r9}}, {@cache_loose}, {@loose}], [{@fsmagic={'fsmagic', 0x3d, 0x1}}, {@obj_user={'obj_user', 0x3d, '\''}}]}}) setxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000600)='system.posix_acl_access\x00', &(0x7f0000000740)={{}, {0x1, 0x2}, [{0x2, 0x0, r2}, {0x2, 0x1, 0xee01}, {0x2, 0x3, 0xee00}, {0x2, 0x22b820e3c02ec89b, 0xee00}, {0x2, 0x6, 0xee00}, {0x2, 0x3}, {0x2, 0x4, r4}, {0x2, 0x1, 0xffffffffffffffff}, {}, {0x2, 0x2, r5}], {}, [{0x8, 0x0, r6}, {0x8, 0x6}, {0x8, 0x6, r7}, {0x8, 0x4, r9}], {0x10, 0x5}}, 0x94, 0x3) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') [ 2784.782857] FAULT_INJECTION: forcing a failure. [ 2784.782857] name failslab, interval 1, probability 0, space 0, times 0 [ 2784.784948] CPU: 1 PID: 11601 Comm: syz-executor.2 Not tainted 5.10.234 #1 [ 2784.786066] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2784.787405] Call Trace: [ 2784.787840] dump_stack+0x107/0x167 [ 2784.788433] should_fail.cold+0x5/0xa [ 2784.789045] ? create_object.isra.0+0x3a/0xa20 [ 2784.789778] should_failslab+0x5/0x20 [ 2784.790392] kmem_cache_alloc+0x5b/0x310 [ 2784.791065] create_object.isra.0+0x3a/0xa20 [ 2784.791776] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2784.792610] kmem_cache_alloc+0x159/0x310 [ 2784.793295] jbd2__journal_start+0x190/0x7e0 [ 2784.794014] __ext4_journal_start_sb+0x214/0x390 [ 2784.794793] ext4_evict_inode+0x8f4/0x1a60 [ 2784.795491] ? ext4_da_write_begin+0xd40/0xd40 [ 2784.796218] ? rwlock_bug.part.0+0x90/0x90 [ 2784.796916] ? ext4_da_write_begin+0xd40/0xd40 [ 2784.797646] evict+0x32b/0x8c0 [ 2784.798162] ? new_inode+0x250/0x250 [ 2784.798765] ? lock_downgrade+0x6d0/0x6d0 [ 2784.799435] ? rwlock_bug.part.0+0x90/0x90 [ 2784.800127] ? fsnotify_grab_connector+0x11a/0x250 [ 2784.800937] iput.part.0+0x4b9/0x6d0 [ 2784.801538] ? trace_event_raw_event_ext4_es_lookup_extent_enter+0x300/0x300 [ 2784.802679] iput+0x58/0x70 [ 2784.803162] dentry_unlink_inode+0x2bb/0x470 [ 2784.803863] __dentry_kill+0x36f/0x5c0 [ 2784.804491] ? dput+0x35/0xcd0 [ 2784.805011] dput+0x6f4/0xcd0 [ 2784.805520] do_renameat2+0x715/0xbf0 [ 2784.806139] ? __ia32_sys_link+0x80/0x80 [ 2784.806805] ? __virt_addr_valid+0x170/0x5d0 [ 2784.807510] ? __check_object_size+0x319/0x440 [ 2784.808283] __x64_sys_rename+0x7d/0xa0 [ 2784.808921] do_syscall_64+0x33/0x40 [ 2784.809522] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2784.810337] RIP: 0033:0x7f721cbccb19 [ 2784.810941] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2784.813888] RSP: 002b:00007f721a142188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2784.815416] RAX: ffffffffffffffda RBX: 00007f721ccdff60 RCX: 00007f721cbccb19 [ 2784.816563] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2784.817704] RBP: 00007f721a1421d0 R08: 0000000000000000 R09: 0000000000000000 [ 2784.818869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2784.820022] R13: 00007ffef6b29f6f R14: 00007f721a142300 R15: 0000000000022000 [ 2784.825467] FAULT_INJECTION: forcing a failure. [ 2784.825467] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2784.828275] CPU: 0 PID: 11599 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 2784.829730] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2784.831465] Call Trace: [ 2784.832027] dump_stack+0x107/0x167 [ 2784.832794] should_fail.cold+0x5/0xa [ 2784.833599] strncpy_from_user+0x34/0x470 [ 2784.834471] getname_flags.part.0+0x95/0x4f0 [ 2784.835402] getname_flags+0x9a/0xe0 [ 2784.836189] do_mkdirat+0x8f/0x2b0 [ 2784.836935] ? user_path_create+0xf0/0xf0 [ 2784.837811] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2784.838921] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2784.840009] do_syscall_64+0x33/0x40 [ 2784.840789] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2784.841867] RIP: 0033:0x7f371d026b19 [ 2784.842649] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2784.846523] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2784.848125] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 2784.849618] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2784.851136] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2784.852637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2784.854131] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 18:50:51 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)) setresuid(0xffffffffffffffff, 0x0, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:50:51 executing program 6: r0 = socket$inet6(0xa, 0x5, 0x7fff) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x4, 0x34, 0x5, 0x18, 0x4, @mcast1, @mcast2, 0x40, 0x7, 0x9, 0x5dc8}}) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) open(&(0x7f0000000200)='./file0\x00', 0x20102, 0x200) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000200002e2f66696c653000"]) creat(&(0x7f0000000240)='./file0\x00', 0x40) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) [ 2784.867834] loop5: detected capacity change from 0 to 1024 [ 2784.877414] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2784.888801] tmpfs: Unknown parameter '' 18:50:51 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:50:51 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) utimes(&(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000440)={{0x77359400}, {r3, r4/1000+10000}}) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r5}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="9fb0b07c4ecd8d51b35a8dfc38a42820fdfef4a8db3e7475083932561770a95f9d78a46b3a76af15c84ef1d7e711284531919356dc71c8c4e067ebf87e241e4d4a0de8a3148f58a75ef63893d6ada7a1c98daff2919701"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r6}, 0x14) 18:50:51 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 12) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:50:51 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 4) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:50:51 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x1ffff000, 0x0) 18:50:51 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)) setresuid(0xffffffffffffffff, 0x0, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:50:51 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file1\x00', 0x208302, 0x100) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000180)='./file0/file1\x00') [ 2785.024598] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2785.038566] FAULT_INJECTION: forcing a failure. [ 2785.038566] name failslab, interval 1, probability 0, space 0, times 0 [ 2785.040854] CPU: 1 PID: 11627 Comm: syz-executor.2 Not tainted 5.10.234 #1 [ 2785.041867] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2785.043107] Call Trace: [ 2785.043506] dump_stack+0x107/0x167 [ 2785.044033] should_fail.cold+0x5/0xa [ 2785.044592] ? create_object.isra.0+0x3a/0xa20 [ 2785.045288] should_failslab+0x5/0x20 [ 2785.045843] kmem_cache_alloc+0x5b/0x310 [ 2785.046439] ? __kasan_slab_free+0x122/0x160 [ 2785.047113] create_object.isra.0+0x3a/0xa20 [ 2785.047739] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2785.048464] __kmalloc+0x16e/0x390 [ 2785.048995] ? __ext4_journal_start_sb+0x1db/0x390 [ 2785.049711] ext4_ext_remove_space+0x15af/0x3d90 [ 2785.050413] ? ext4_es_remove_extent+0x2f2/0x450 [ 2785.051117] ? do_raw_read_unlock+0x70/0x70 [ 2785.051746] ? ext4_da_release_space+0x21/0x480 [ 2785.052399] ? ext4_ext_index_trans_blocks+0x170/0x170 [ 2785.053160] ? ext4_es_lookup_extent+0xaa0/0xaa0 [ 2785.053846] ? down_write+0xe0/0x160 [ 2785.054380] ? down_write_killable+0x180/0x180 [ 2785.055058] ext4_ext_truncate+0x1ea/0x250 [ 2785.055671] ext4_truncate+0xc38/0x1160 [ 2785.056258] ? ext4_punch_hole+0x1070/0x1070 [ 2785.056904] ? __ext4_journal_start_sb+0x214/0x390 [ 2785.057624] ? __ext4_journal_start_sb+0x1db/0x390 [ 2785.058336] ext4_evict_inode+0xae0/0x1a60 [ 2785.058960] ? ext4_da_write_begin+0xd40/0xd40 [ 2785.059619] ? rwlock_bug.part.0+0x90/0x90 [ 2785.060234] ? ext4_da_write_begin+0xd40/0xd40 [ 2785.060900] evict+0x32b/0x8c0 [ 2785.061366] ? new_inode+0x250/0x250 [ 2785.061902] ? lock_downgrade+0x6d0/0x6d0 [ 2785.062511] ? rwlock_bug.part.0+0x90/0x90 [ 2785.063129] ? fsnotify_grab_connector+0x11a/0x250 [ 2785.063857] iput.part.0+0x4b9/0x6d0 [ 2785.064390] ? trace_event_raw_event_ext4_es_lookup_extent_enter+0x300/0x300 [ 2785.065413] iput+0x58/0x70 [ 2785.065850] dentry_unlink_inode+0x2bb/0x470 [ 2785.066485] __dentry_kill+0x36f/0x5c0 [ 2785.067063] ? dput+0x35/0xcd0 [ 2785.067531] dput+0x6f4/0xcd0 [ 2785.067984] do_renameat2+0x715/0xbf0 [ 2785.068540] ? __ia32_sys_link+0x80/0x80 [ 2785.069128] ? __virt_addr_valid+0x170/0x5d0 [ 2785.069756] ? __check_object_size+0x319/0x440 [ 2785.070429] __x64_sys_rename+0x7d/0xa0 [ 2785.071011] do_syscall_64+0x33/0x40 [ 2785.071537] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2785.072273] RIP: 0033:0x7f721cbccb19 [ 2785.072799] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2785.075439] RSP: 002b:00007f721a142188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2785.076524] RAX: ffffffffffffffda RBX: 00007f721ccdff60 RCX: 00007f721cbccb19 [ 2785.077540] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2785.078570] RBP: 00007f721a1421d0 R08: 0000000000000000 R09: 0000000000000000 [ 2785.079624] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2785.080641] R13: 00007ffef6b29f6f R14: 00007f721a142300 R15: 0000000000022000 18:50:51 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(0x0, &(0x7f0000000180)='./file1\x00') 18:50:51 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:50:51 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000680)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x4, &(0x7f0000000040), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f00000000c0), 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/tty/ldiscs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_uring_enter(r2, 0x58ab, 0xff30, 0x0, 0x0, 0x0) setresuid(0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file1\x00', 0x7f, 0x6, &(0x7f0000000600)=[{&(0x7f0000000140)="07e9fa437b35f8d0f136c12adbafb1fb438376dfed6fc820fecdf7ac3167b1533c5c620742ec2519e1b5debef38235352fa201024915425745ef28", 0x3b, 0x7}, {&(0x7f0000000180)="f05c8914357b1c2305ad63d5ed7186fef35c265e249396de08748d0027c76ca26d55d61533a29cf174f707bfaaf78c4ebe2e5e7a33a7657c8bd39d4d75b3c245140e43f4966fd3372b065053d63c336d2965d677864c0706dd3eedaeb2d8880ff2f87dac1c4992aa4030f8fae0f3a70ac4d5e3ac5978c260efd72ad6acbd2db0c84550abc6f87b60facf578ddd56d252fb2c9fe0c7bed5f373d387ac40302b78c2f946d9a079564d3e259ab3", 0xac, 0xfffffffffffffff7}, {&(0x7f0000000240)="f0b6a97b78d25974b361eb01f330378bffe6a5ac0480d50157f0bdb7a3deac6c794d9cf669efe87e905291dee07cb08b66698667300c19beabd58815ace68d160042b9c8b726a6f22d247b884ebc6d240fbf82dec3b58d647ba05ee39b9b653072f473d5be1d59e05c5aefb49832e0493a54cbbe1a2a75990c56d060cd7c00f5f2d6dcbf1998bfde2fb1f3f36101ccd58de939c634235a14d977f0130649650058a3fb8474082468120db68d091ebd0be9fe38d662ba8d6d583670b38724563ef1a5c090dfa49012e82bce7ac7cfab18bd645109c2d33a700213", 0xda}, {&(0x7f0000000340)="8910a013eb6a4ba7077c8c627b63dbf5fb6029dab42bf800a8cf17cad80d786cbf2fe8cc69f9ab5b03947cbdebf6ccc1b5332d5e1d007f172ea11d975d3b204168738558e37d0c67a3cad6899e9526cde359969fd8626bda99102e07841c13e4eaec44b2e722bf61a13a3bbc8ee0284bce23f985fd45bca412018eeffdeac9b0128c2d82cff029a0838a592716d05d00642a34ff99cc0adc9fde659386a2a86a3822c36a4c9126ec48b333681069250fd48cbb7d0d1af5135e54f4f5aa160e2dd2d961b7d42106253c24e070905d9b7b75c60031d7de11d9980ba9ea307de29e80dc404aefbab534c4d8de095d", 0xed, 0xfffffffffffffffa}, {&(0x7f0000000440)="643a0a747a8da8264adfc022e0dcdc5f21b023c558aed41f33b130c1c03ba7643e4188da75a6f238f3ea27fd013d67c763ddd188b7c210488529c1ff6a7019c564d99f020e5852a0974f458416220489f4ad3c44de6963e7090119bcc86d55b0715a6339f6c602287e5de4a3d6cc692685a39c0511d3274e5ebc8c3b382b6a4c9b115478ac25434568d0def44a9ccbdf71f91e9013f5bf2688e9af55be91ad57d148195d3b2d37d4824aab9d5a9424e8175d5d6d7ebfe243120912f1a052cf840a3cfc755e5f19f5266968c89d43e1230047198fe7a2b063cf25cdafb09d1745399da78420bf7b", 0xe7, 0x100000001}, {&(0x7f0000000540)="b83b6cc84da4dccb7ab7376a3ef76bc089c60b0525a65a09522c61bd4db0cd48c593ecfd68db8f74fbd7c9f9e915ff3774fb2713d85ef73a1f8c542b453544cbcd514e3f687ec4af44dce860d364f8f535bb13413c3fe6678776ce82904915a9d84c056e7cd528feb854b3968dd8f63ffaf7c0d60bbaa87ea7f78b295cdc58bffb1862e0c55941650374", 0x8a, 0x4}], 0x5, &(0x7f0000000800)=ANY=[@ANYBLOB="6a6f75726e616c5f696f7072696f4d3078303030303030303030303030303030302c6e6f61636c2c3a508881", @ANYRESDEC=r1, @ANYBLOB=',mask=MAY_APPEND,defcontext=unconfined_u,hash,fowner=', @ANYRESDEC=0x0, @ANYBLOB="2c6673757569643d323539653336310e2d306362342d006561322d396366612d65636330363637392c6673636f6e746578743d73746166665f752c7375626a5f757365723d2d090000000800000000000000726f6f743dc54ff1a51d0e0ffbb84ce02328de98259c0223cb09ec958fa0a146e32a6e7d2364d0077f6b9a8e170e5c17d0d3470c5b6ce0c06fa7de4c51ecc0fb1f58b7f33faccf5461c00dcbfdbda3547db03fb36f8c3386009e70ce4a73de"]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000740)='./file1\x00', 0x100, 0x1, &(0x7f0000000940)) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x242c, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}, {@afid={'afid', 0x3d, 0xe8e8}}, {}, {@afid={'afid', 0x3d, 0x4}}, {@dfltgid={'dfltgid', 0x3d, r6}}, {@cache_loose}, {@loose}], [{@fsmagic={'fsmagic', 0x3d, 0x1}}, {@obj_user={'obj_user', 0x3d, '\''}}]}}) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x242c, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}, {@afid={'afid', 0x3d, 0xe8e8}}, {}, {@afid={'afid', 0x3d, 0x4}}, {@dfltgid={'dfltgid', 0x3d, r7}}, {@cache_loose}, {@loose}], [{@fsmagic={'fsmagic', 0x3d, 0x1}}, {@obj_user={'obj_user', 0x3d, '\''}}]}}) [ 2785.129637] FAULT_INJECTION: forcing a failure. [ 2785.129637] name failslab, interval 1, probability 0, space 0, times 0 [ 2785.132889] CPU: 0 PID: 11636 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 2785.134333] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2785.136098] Call Trace: [ 2785.136663] dump_stack+0x107/0x167 [ 2785.137436] should_fail.cold+0x5/0xa [ 2785.138248] ? __d_alloc+0x2a/0x990 [ 2785.139030] should_failslab+0x5/0x20 [ 2785.139835] kmem_cache_alloc+0x5b/0x310 [ 2785.140697] ? __d_lookup+0x3bf/0x760 [ 2785.141527] __d_alloc+0x2a/0x990 [ 2785.142285] d_alloc+0x46/0x1c0 [ 2785.143009] __lookup_hash+0xcc/0x190 [ 2785.143837] filename_create+0x186/0x4a0 [ 2785.144715] ? filename_parentat+0x570/0x570 [ 2785.145664] ? getname_flags.part.0+0x1dd/0x4f0 [ 2785.146679] do_mkdirat+0xa2/0x2b0 [ 2785.147457] ? user_path_create+0xf0/0xf0 [ 2785.148362] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2785.149489] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2785.150607] do_syscall_64+0x33/0x40 [ 2785.151415] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2785.152563] RIP: 0033:0x7f371d026b19 [ 2785.153373] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2785.158327] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2785.160056] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 2785.161651] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2785.163385] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2785.165107] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2785.166653] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 [ 2785.172577] tmpfs: Unknown parameter '' [ 2785.219974] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. 18:51:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 13) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:51:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r5}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r6}, 0x14) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) r7 = openat$cgroup_subtree(r0, &(0x7f0000000440), 0x2, 0x0) lstat(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300), 0x4043, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@cachetag={'cachetag', 0x3d, 'smackfsroot'}}, {@cachetag={'cachetag', 0x3d, 'measure'}}, {@privport}, {@cachetag={'cachetag', 0x3d, '$%},:),$'}}, {@nodevmap}], [{@euid_gt={'euid>', r8}}, {@euid_lt={'euid<', r4}}]}}) 18:51:06 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) renameat2(r1, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:51:06 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x20000000, 0x0) 18:51:06 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 18:51:06 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(0x0, &(0x7f0000000180)='./file1\x00') 18:51:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 5) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:51:06 executing program 5: sendmsg$DEVLINK_CMD_RATE_NEW(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="48631464", @ANYRES16=0x0, @ANYBLOB="000228bd7000fddbdf254c0000000800030001000000080003000200000008000300000000000c00a70005000000000000000e00a90066697273746e616d65000000"], 0x48}}, 0x50) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') syz_io_uring_setup(0x50c9, &(0x7f0000000280)={0x0, 0x2e5f, 0x8, 0x1, 0x1cc}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000300), &(0x7f0000000340)=0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0/file0\x00', 0x26182, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000480)=@IORING_OP_READ=@pass_buffer={0x16, 0x1, 0x4007, @fd=r2, 0xff, &(0x7f00000003c0)=""/133, 0x85, 0x0, 0x1}, 0x9) [ 2800.393548] FAULT_INJECTION: forcing a failure. [ 2800.393548] name failslab, interval 1, probability 0, space 0, times 0 [ 2800.396266] CPU: 0 PID: 11666 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 2800.397263] FAULT_INJECTION: forcing a failure. [ 2800.397263] name failslab, interval 1, probability 0, space 0, times 0 [ 2800.397751] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2800.397784] Call Trace: [ 2800.397811] dump_stack+0x107/0x167 [ 2800.397833] should_fail.cold+0x5/0xa [ 2800.397855] ? create_object.isra.0+0x3a/0xa20 [ 2800.397878] should_failslab+0x5/0x20 [ 2800.397898] kmem_cache_alloc+0x5b/0x310 [ 2800.397927] create_object.isra.0+0x3a/0xa20 [ 2800.397945] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2800.397980] kmem_cache_alloc+0x159/0x310 [ 2800.409680] ? __d_lookup+0x3bf/0x760 [ 2800.410495] __d_alloc+0x2a/0x990 [ 2800.411256] d_alloc+0x46/0x1c0 [ 2800.411968] __lookup_hash+0xcc/0x190 [ 2800.412787] filename_create+0x186/0x4a0 [ 2800.413657] ? filename_parentat+0x570/0x570 [ 2800.414577] ? getname_flags.part.0+0x1dd/0x4f0 [ 2800.415572] do_mkdirat+0xa2/0x2b0 [ 2800.416343] ? user_path_create+0xf0/0xf0 [ 2800.417237] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2800.418269] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2800.419305] do_syscall_64+0x33/0x40 [ 2800.420087] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2800.421184] RIP: 0033:0x7f371d026b19 [ 2800.422056] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2800.426033] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2800.427627] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 2800.429129] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2800.430614] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2800.432129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2800.433625] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 [ 2800.435123] CPU: 1 PID: 11669 Comm: syz-executor.2 Not tainted 5.10.234 #1 [ 2800.436929] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2800.438984] Call Trace: [ 2800.439687] dump_stack+0x107/0x167 [ 2800.440607] should_fail.cold+0x5/0xa [ 2800.441596] ? create_object.isra.0+0x3a/0xa20 [ 2800.442788] should_failslab+0x5/0x20 [ 2800.443763] kmem_cache_alloc+0x5b/0x310 [ 2800.444778] ? pagecache_get_page+0x243/0xc80 [ 2800.445941] create_object.isra.0+0x3a/0xa20 [ 2800.447042] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2800.448321] kmem_cache_alloc+0x159/0x310 [ 2800.449362] ext4_free_blocks+0x10ef/0x21f0 [ 2800.449426] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2800.450418] ? ext4_mb_new_blocks+0x45c0/0x45c0 [ 2800.450454] ? __ext4_journal_ensure_credits+0x263/0x2e0 [ 2800.450485] ext4_ext_remove_space+0x1ef7/0x3d90 [ 2800.450543] ? ext4_ext_index_trans_blocks+0x170/0x170 [ 2800.456408] ? ext4_es_lookup_extent+0xaa0/0xaa0 [ 2800.457421] ? down_write+0xe0/0x160 [ 2800.458334] ? down_write_killable+0x180/0x180 [ 2800.459486] ext4_ext_truncate+0x1ea/0x250 [ 2800.460584] ext4_truncate+0xc38/0x1160 [ 2800.461611] ? ext4_punch_hole+0x1070/0x1070 [ 2800.462612] ? __ext4_journal_start_sb+0x214/0x390 [ 2800.463674] ? __ext4_journal_start_sb+0x1db/0x390 [ 2800.464730] ext4_evict_inode+0xae0/0x1a60 [ 2800.465671] ? ext4_da_write_begin+0xd40/0xd40 [ 2800.466653] ? rwlock_bug.part.0+0x90/0x90 [ 2800.467568] ? ext4_da_write_begin+0xd40/0xd40 [ 2800.468526] evict+0x32b/0x8c0 [ 2800.469208] ? new_inode+0x250/0x250 [ 2800.470002] ? lock_downgrade+0x6d0/0x6d0 [ 2800.470880] ? rwlock_bug.part.0+0x90/0x90 [ 2800.471798] ? fsnotify_grab_connector+0x11a/0x250 [ 2800.472968] iput.part.0+0x4b9/0x6d0 [ 2800.473881] ? trace_event_raw_event_ext4_es_lookup_extent_enter+0x300/0x300 [ 2800.475733] iput+0x58/0x70 [ 2800.476511] dentry_unlink_inode+0x2bb/0x470 [ 2800.477662] __dentry_kill+0x36f/0x5c0 [ 2800.478679] ? dput+0x35/0xcd0 [ 2800.479529] dput+0x6f4/0xcd0 [ 2800.480357] do_renameat2+0x715/0xbf0 [ 2800.481333] ? __ia32_sys_link+0x80/0x80 [ 2800.482366] ? __virt_addr_valid+0x170/0x5d0 [ 2800.483529] ? __check_object_size+0x319/0x440 [ 2800.484759] __x64_sys_rename+0x7d/0xa0 [ 2800.485756] do_syscall_64+0x33/0x40 [ 2800.486696] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2800.487992] RIP: 0033:0x7f721cbccb19 [ 2800.488961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2800.493658] RSP: 002b:00007f721a142188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2800.495641] RAX: ffffffffffffffda RBX: 00007f721ccdff60 RCX: 00007f721cbccb19 [ 2800.497486] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2800.499293] RBP: 00007f721a1421d0 R08: 0000000000000000 R09: 0000000000000000 [ 2800.501139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2800.502987] R13: 00007ffef6b29f6f R14: 00007f721a142300 R15: 0000000000022000 18:51:06 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(0x0, &(0x7f0000000180)='./file1\x00') 18:51:06 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 18:51:06 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x21000000, 0x0) 18:51:06 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) openat(r0, &(0x7f0000000580)='./file0/file0\x00', 0x4000, 0x80) r1 = syz_mount_image$nfs4(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x6, 0x7, &(0x7f0000000980)=[{&(0x7f00000006c0)="a96ad89b1501e3bd372c30db87ed2b0bb72ac560ea06920b9c49482714a842a28e4bb088cdb98477d6a1a0268a1c0767b704887bc3a302064a44cf50032b63a5d5fd5ec1a75780a6f7f4df9711bddab6f7019112cb5f973932b85e81f57c", 0x5e, 0xfffffffffffffff9}, {&(0x7f0000000740)="35c48c219c4ba01a90b005cd428cd2c0dc2fb31fff5fe307a58f036e713cd5c36d4145af7be885aba164afb3e6579cd329cec85a0112a39e352d1620a5180016e35e77e4274c352051e1e98f9a2ccb6287f221082fadb3a9dc167b991ecba1b624a694129186ebc034a7bcc37ef561dea8502d834bdbf845153defe4bc155e7618b66ede49c9ee", 0x87, 0x1}, {&(0x7f0000000800)="6780062544187d62ff8093765695cd52893424912ad45fcdc627c0312afb1598cd1df1c35667ba826895512d86f2b73d382fe40c978775415aa01a0c773928b2902c1bbd56f4e09b4b", 0x49, 0x3ff}, {&(0x7f00000002c0)="f21cf4eff4c2996824c3ea7f7f2004dbe5fe7d39c2747d0c2567", 0x1a, 0xff}, {&(0x7f0000000880)="7e09415e60f1cf742d08278749344572f9344c6fb0a0ce22e6b463f18b2de9e559944676a31b3b8950ff9c2fd336048afd075fa4845e458890bb8f95018f72e9b2c5156690d6051461b5f661e78b3ee994677e965360c81aaa3955fa86804363d278049b726a49e6d6b452d57880fce67455d10696676855ac5048da7c877d987fc2875bf3e3310541b9", 0x8a, 0x5}, {&(0x7f0000000380)="b4fe2d3619d4a31fca135843ddeadb2492953a0f0a9ebe63480efe1ab13b72af99ed8a2ccc55726075fd4dce3078a80effaf91966280c0239df8", 0x3a, 0x7ff}, {&(0x7f0000000940)="8d8b0764756b98799dd6f93868456d1ae1c79f6b38e8123b5103a5b99af6c78e40c6ce2ec31a9521e7981c2bad144a61", 0x30, 0x6}], 0x2018, &(0x7f0000000a40)={[{',{\x94+{,+#\x00'}, {'!\''}], [{@fowner_eq}, {@obj_role}, {@appraise}, {@pcr}, {@seclabel}, {@pcr={'pcr', 0x3d, 0x3}}, {@smackfshat}]}) r2 = openat(r1, &(0x7f0000000b00)='./file0/file0\x00', 0x200, 0x10) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) openat(r2, &(0x7f0000000bc0)='./file0/file0\x00', 0x402002, 0xe5) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), &(0x7f0000000480)=[&(0x7f0000000240)='proc\x00', &(0x7f0000000280)='proc\x00', &(0x7f0000000100)=',{\x94+{,+#\x00', &(0x7f0000000300)='proc\x00', &(0x7f0000000340)='proc\x00', &(0x7f0000000680)='\x00', &(0x7f00000003c0)='.[\xe0\x00', &(0x7f0000000400)='\xb6!\x00', &(0x7f0000000440)='\xe0i\x17\xd5'], 0x800) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') mount$cgroup(0x0, &(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80), 0x1042000, &(0x7f0000000e40)=ANY=[@ANYBLOB="636c6f6e655f847317c86472651ba3b86e2c667265657a65722c636c6f6e4e5f6368696c6472656e2c7375626a5f757365723d736d61636b66736861742c6f626a666f776e65723e29fd1bf6daa47c053fbb3e1f78854a70c722d556d898e55172331d03220f06d554c5bcbec43032533cc5d191c9d1acc1c61c28baee52388f1b834818b474d05fe8f2d77b3fae58ccdd809b30349d4a5ebbc62a6ea07b365842406c41e4dd90e3a8a91ed32a85fb03c51badbb1718656f7646461d0bcc08177f52e4162c43663a5654349eb44b", @ANYRESDEC=0x0, @ANYRES16=r1]) openat(r0, &(0x7f0000000500)='./file0/file0\x00', 0x4000, 0x4) getxattr(&(0x7f0000000540)='./file0/file0\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f00000005c0)=""/166, 0xa6) [ 2800.561509] tmpfs: Unknown parameter 'ÿÿ00000000000000000000005' [ 2800.608560] 9pnet: Insufficient options for proto=fd [ 2800.614996] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2800.657047] loop5: detected capacity change from 0 to 8388096 18:51:22 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="bf2daf2110ca7c8fb2227d886d7ce7e2c1a0cde3fb8c6af31f6799cf9b0a64860fa4efaed404c872c557576d8df445b4d42f832e378c70d36c3b682f26500c3f2947d5d05ab1d4928d62ce7fc918df2dd199d41a33d34500aad3b6e802681b9c6d412d3328a87958a06092bd880163e1c8e65ace206a25821be4c5c6b97ca2347d88db7023b4c950ccf4f88d2e", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0/file0\x00']) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') 18:51:22 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', 0x0) 18:51:22 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0xff600000, 0x0) 18:51:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 6) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:51:22 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:51:22 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 18:51:22 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r4, 0x200, 0x70bd2d, 0x80, {{}, {@val={0x8, 0x3, r5}, @void}}}, 0x1c}}, 0x4) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x401) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="f428dce58175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r6}, 0x14) 18:51:22 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 14) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2816.760611] FAULT_INJECTION: forcing a failure. [ 2816.760611] name failslab, interval 1, probability 0, space 0, times 0 [ 2816.763465] CPU: 0 PID: 11701 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 2816.764983] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2816.766787] Call Trace: [ 2816.767364] dump_stack+0x107/0x167 [ 2816.768170] should_fail.cold+0x5/0xa [ 2816.769003] ? cgroup_mkdir+0x251/0xf50 [ 2816.769868] should_failslab+0x5/0x20 [ 2816.770693] __kmalloc+0x72/0x390 [ 2816.771460] cgroup_mkdir+0x251/0xf50 [ 2816.772306] ? cgroup_destroy_locked+0x710/0x710 [ 2816.773331] kernfs_iop_mkdir+0x14d/0x1e0 [ 2816.774234] vfs_mkdir+0x493/0x750 [ 2816.775010] do_mkdirat+0x150/0x2b0 [ 2816.775810] ? user_path_create+0xf0/0xf0 [ 2816.776719] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2816.777855] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2816.778975] do_syscall_64+0x33/0x40 [ 2816.779781] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2816.780908] RIP: 0033:0x7f371d026b19 [ 2816.781711] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2816.785758] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2816.787450] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 2816.789013] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2816.790572] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2816.792106] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2816.793625] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 18:51:23 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) [ 2816.814934] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2816.830185] FAULT_INJECTION: forcing a failure. [ 2816.830185] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2816.833258] CPU: 1 PID: 11713 Comm: syz-executor.2 Not tainted 5.10.234 #1 [ 2816.834894] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2816.836882] Call Trace: [ 2816.837547] dump_stack+0x107/0x167 [ 2816.838474] should_fail.cold+0x5/0xa [ 2816.839295] _copy_to_user+0x2e/0x180 [ 2816.840186] simple_read_from_buffer+0xcc/0x160 [ 2816.841340] proc_fail_nth_read+0x198/0x230 [ 2816.842460] ? proc_sessionid_read+0x230/0x230 [ 2816.843600] ? security_file_permission+0xb1/0xe0 [ 2816.844768] ? proc_sessionid_read+0x230/0x230 [ 2816.845737] vfs_read+0x228/0x620 [ 2816.846471] ksys_read+0x12d/0x260 [ 2816.847219] ? vfs_write+0xb10/0xb10 [ 2816.848052] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2816.849161] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2816.850262] do_syscall_64+0x33/0x40 [ 2816.851070] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2816.852166] RIP: 0033:0x7f721cb7f69c [ 2816.852939] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2816.856904] RSP: 002b:00007f721a142170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2816.858518] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f721cb7f69c [ 2816.860055] RDX: 000000000000000f RSI: 00007f721a1421e0 RDI: 0000000000000004 [ 2816.861574] RBP: 00007f721a1421d0 R08: 0000000000000000 R09: 0000000000000000 [ 2816.863107] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2816.864662] R13: 00007ffef6b29f6f R14: 00007f721a142300 R15: 0000000000022000 18:51:23 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', 0x0) 18:51:23 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') stat(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000200)) [ 2816.911093] tmpfs: Unknown parameter '' 18:51:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x2000000000, 0x0) 18:51:23 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 7) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:51:23 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:51:23 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000800)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',dfltuid=', @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=r3, @ANYBLOB=',euid<', @ANYRESDEC=r4, @ANYBLOB=',measure,fsuuid=75d1fb27-7ab5-2c03-5304-afcb01cf,smackfshat=trans=fd,,hash,fowner>', @ANYRESDEC=r4, @ANYBLOB="2c7375626a5f747970653d2c6d61736b3d5e4d41595f57524900000001736d616769633d3078303030303030303030303030383030312c7569643d", @ANYRESDEC=r4, @ANYBLOB=',smackfshat=measure,obj_type=${,audit,\x00']) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="010400000000000010"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000000500)={0x8000, {{0xa, 0x4e21, 0xf3cc, @remote, 0x7}}, {{0xa, 0x4e23, 0x80000000, @empty, 0x2}}}, 0x108) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r5}, 0x14) 18:51:23 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', 0x0) [ 2817.054185] FAULT_INJECTION: forcing a failure. [ 2817.054185] name failslab, interval 1, probability 0, space 0, times 0 [ 2817.056903] CPU: 0 PID: 11729 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 2817.058452] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2817.060209] Call Trace: [ 2817.060837] dump_stack+0x107/0x167 [ 2817.061600] should_fail.cold+0x5/0xa [ 2817.062408] ? create_object.isra.0+0x3a/0xa20 [ 2817.063366] should_failslab+0x5/0x20 [ 2817.064174] kmem_cache_alloc+0x5b/0x310 [ 2817.065029] create_object.isra.0+0x3a/0xa20 [ 2817.065946] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2817.067012] __kmalloc+0x16e/0x390 [ 2817.067773] cgroup_mkdir+0x251/0xf50 [ 2817.068587] ? cgroup_destroy_locked+0x710/0x710 [ 2817.069582] kernfs_iop_mkdir+0x14d/0x1e0 [ 2817.070454] vfs_mkdir+0x493/0x750 [ 2817.071201] do_mkdirat+0x150/0x2b0 [ 2817.071987] ? user_path_create+0xf0/0xf0 [ 2817.072955] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2817.074256] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2817.075356] do_syscall_64+0x33/0x40 [ 2817.076144] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2817.077215] RIP: 0033:0x7f371d026b19 [ 2817.077994] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2817.081869] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2817.083461] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 2817.084959] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2817.086451] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2817.087983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2817.089496] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 18:51:23 executing program 6: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') readv(r2, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x6, 0x4, 0xff, 0x9, 0x0, 0x4, 0x8f41, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0x9, 0x5}, 0x4, 0x4, 0x81, 0x1, 0xc, 0x1375, 0x4, 0x0, 0xf049, 0x0, 0x7fff}, r1, 0x5, r2, 0x3) prlimit64(r1, 0x2, &(0x7f00000012c0)={0x4, 0x800}, &(0x7f0000001300)) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0xa0) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0x104, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in, 0x0, 0x3c}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa, 0x2, 0x0, 0x3f}, [@coaddr={0x14, 0xe, @in=@empty}]}, 0x104}}, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) close_range(r3, r3, 0x0) stat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000001200)=[0xee01]) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file1\x00', &(0x7f0000001100)='system.posix_acl_access\x00', &(0x7f0000001240)={{}, {0x1, 0x1}, [{0x2, 0x6, 0xee01}], {}, [{0x8, 0x1, r5}, {0x8, 0x1, 0xee00}, {0x8, 0x7, 0xee01}, {0x8, 0x4}, {0x8, 0x2}, {0x8, 0x4, r6}], {0x10, 0x7}, {0x20, 0x4}}, 0x5c, 0x1) ioctl$BTRFS_IOC_INO_LOOKUP(r3, 0xd0009412, &(0x7f0000000100)={0x0, 0xb69}) 18:51:23 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) openat(r1, &(0x7f0000000040)='./file0\x00', 0x64001, 0x80) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') 18:51:23 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r4, 0x200, 0x70bd2d, 0x80, {{}, {@val={0x8, 0x3, r5}, @void}}}, 0x1c}}, 0x4) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x401) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="f428dce58175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r6}, 0x14) [ 2817.208822] mmap: syz-executor.6 (11735): VmData 37515264 exceed data ulimit 4. Update limits or use boot option ignore_rlimit_data. [ 2817.242954] tmpfs: Unknown parameter '' 18:51:23 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:51:23 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c0000002000210c0000000000000000020000000000af01c0000000"], 0x1c}}, 0x0) mkdirat(r1, &(0x7f0000000040)='./file0/file0\x00', 0x53) 18:51:23 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) flistxattr(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x4000004) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') 18:51:23 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x5c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x5c}}, 0x0) connect(r0, &(0x7f0000000440)=@nfc={0x27, 0x1, 0x2, 0x1}, 0x80) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r5}, 0x14) 18:51:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x2100000000, 0x0) 18:51:23 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000800)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',dfltuid=', @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=r3, @ANYBLOB=',euid<', @ANYRESDEC=r4, @ANYBLOB=',measure,fsuuid=75d1fb27-7ab5-2c03-5304-afcb01cf,smackfshat=trans=fd,,hash,fowner>', @ANYRESDEC=r4, @ANYBLOB="2c7375626a5f747970653d2c6d61736b3d5e4d41595f57524900000001736d616769633d3078303030303030303030303030383030312c7569643d", @ANYRESDEC=r4, @ANYBLOB=',smackfshat=measure,obj_type=${,audit,\x00']) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="010400000000000010"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000000500)={0x8000, {{0xa, 0x4e21, 0xf3cc, @remote, 0x7}}, {{0xa, 0x4e23, 0x80000000, @empty, 0x2}}}, 0x108) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r5}, 0x14) 18:51:41 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) lsetxattr$security_evm(&(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000280), &(0x7f0000000740)=@v2={0x3, 0x1, 0x12, 0x8, 0xc6, "ddc2c5290343e1918848c0436ebc187ca9d75a0dc6e527af03b03ac0b8f1055a001ad9cda0507c21fbb112b7a4c109647a5e4fbf46178e566810c85ef505a4cd51cbe51c29f282a52b3534b1fb942f089ede9bfff8b93ba67a7e8c1cfde748ac5af035f6eb895f83baf3fe023c89a6dc0fbb2c2a8a8dab9153f9a7c42ac00299ba7dc051a507077fa7b6bbdd46f9d27a468929b73b192036460cc1a9bed1967b3249968ba00386d3e7cda31cf4c4841662d93439c479f63432b0c1d1f501277c20b8629af82c"}, 0xcf, 0x2) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:51:41 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:51:41 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 18:51:41 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') readv(r2, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x6, 0x4, 0xff, 0x9, 0x0, 0x4, 0x8f41, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0x9, 0x5}, 0x4, 0x4, 0x81, 0x1, 0xc, 0x1375, 0x4, 0x0, 0xf049, 0x0, 0x7fff}, r1, 0x5, r2, 0x3) prlimit64(r1, 0x2, &(0x7f00000012c0)={0x4, 0x800}, &(0x7f0000001300)) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0xa0) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0x104, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in, 0x0, 0x3c}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa, 0x2, 0x0, 0x3f}, [@coaddr={0x14, 0xe, @in=@empty}]}, 0x104}}, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) close_range(r3, r3, 0x0) stat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000001200)=[0xee01]) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file1\x00', &(0x7f0000001100)='system.posix_acl_access\x00', &(0x7f0000001240)={{}, {0x1, 0x1}, [{0x2, 0x6, 0xee01}], {}, [{0x8, 0x1, r5}, {0x8, 0x1, 0xee00}, {0x8, 0x7, 0xee01}, {0x8, 0x4}, {0x8, 0x2}, {0x8, 0x4, r6}], {0x10, 0x7}, {0x20, 0x4}}, 0x5c, 0x1) ioctl$BTRFS_IOC_INO_LOOKUP(r3, 0xd0009412, &(0x7f0000000100)={0x0, 0xb69}) 18:51:41 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x8800, 0x109) 18:51:41 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xc41, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') 18:51:41 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x60ffffffffff, 0x0) 18:51:41 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) inotify_add_watch(r0, &(0x7f0000000040)='./file1\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r5}, 0x14) getxattr(&(0x7f0000000300)='mnt/encrypted_dir/file0\x00', &(0x7f0000000440)=@random={'system.', '\x00'}, &(0x7f0000000700)=""/81, 0x51) [ 2834.903508] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2834.930907] FAULT_INJECTION: forcing a failure. [ 2834.930907] name failslab, interval 1, probability 0, space 0, times 0 [ 2834.934014] CPU: 1 PID: 11778 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 2834.935731] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2834.937754] Call Trace: [ 2834.938364] dump_stack+0x107/0x167 [ 2834.939247] should_fail.cold+0x5/0xa [ 2834.940225] ? create_object.isra.0+0x3a/0xa20 [ 2834.941418] should_failslab+0x5/0x20 [ 2834.942320] kmem_cache_alloc+0x5b/0x310 [ 2834.943285] create_object.isra.0+0x3a/0xa20 [ 2834.944324] kmemleak_alloc_percpu+0xa0/0x100 [ 2834.945473] pcpu_alloc+0x4e2/0x1240 [ 2834.946445] ? cset_cgroup_from_root+0x220/0x220 [ 2834.947537] percpu_ref_init+0x31/0x3d0 [ 2834.948471] cgroup_mkdir+0x288/0xf50 [ 2834.949434] ? cgroup_destroy_locked+0x710/0x710 [ 2834.950544] kernfs_iop_mkdir+0x14d/0x1e0 [ 2834.951613] vfs_mkdir+0x493/0x750 [ 2834.952505] do_mkdirat+0x150/0x2b0 [ 2834.953390] ? user_path_create+0xf0/0xf0 [ 2834.954384] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2834.955561] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2834.956821] do_syscall_64+0x33/0x40 [ 2834.957790] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2834.959010] RIP: 0033:0x7f371d026b19 [ 2834.959855] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2834.964477] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2834.966316] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 2834.968122] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 18:51:41 executing program 7: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) flistxattr(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x4000004) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') [ 2834.969855] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2834.971808] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2834.973580] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 [ 2834.989048] tmpfs: Unknown parameter '' 18:51:41 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x7fcccedc2000, 0x0) 18:51:41 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x32040, 0x0) openat(r0, &(0x7f0000000080)='./file0/file0\x00', 0x482200, 0x40) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/vlan/vlan1\x00') r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) readv(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)=""/109, 0x6d}, {&(0x7f0000000240)=""/244, 0xf4}], 0x2) dup(r0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x220080, 0xc) 18:51:41 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f0000000080)='./file0\x00') 18:51:55 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) lsetxattr$security_evm(&(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000280), &(0x7f0000000740)=@v2={0x3, 0x1, 0x12, 0x8, 0xc6, "ddc2c5290343e1918848c0436ebc187ca9d75a0dc6e527af03b03ac0b8f1055a001ad9cda0507c21fbb112b7a4c109647a5e4fbf46178e566810c85ef505a4cd51cbe51c29f282a52b3534b1fb942f089ede9bfff8b93ba67a7e8c1cfde748ac5af035f6eb895f83baf3fe023c89a6dc0fbb2c2a8a8dab9153f9a7c42ac00299ba7dc051a507077fa7b6bbdd46f9d27a468929b73b192036460cc1a9bed1967b3249968ba00386d3e7cda31cf4c4841662d93439c479f63432b0c1d1f501277c20b8629af82c"}, 0xcf, 0x2) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:51:55 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) lsetxattr$security_evm(&(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000280), &(0x7f0000000740)=@v2={0x3, 0x1, 0x12, 0x8, 0xc6, "ddc2c5290343e1918848c0436ebc187ca9d75a0dc6e527af03b03ac0b8f1055a001ad9cda0507c21fbb112b7a4c109647a5e4fbf46178e566810c85ef505a4cd51cbe51c29f282a52b3534b1fb942f089ede9bfff8b93ba67a7e8c1cfde748ac5af035f6eb895f83baf3fe023c89a6dc0fbb2c2a8a8dab9153f9a7c42ac00299ba7dc051a507077fa7b6bbdd46f9d27a468929b73b192036460cc1a9bed1967b3249968ba00386d3e7cda31cf4c4841662d93439c479f63432b0c1d1f501277c20b8629af82c"}, 0xcf, 0x2) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:51:55 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 9) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:51:55 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x101140, 0x11) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:51:55 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) openat(r4, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', 0x400540, 0x100) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x39, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r5}, 0x14) 18:51:55 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x2121080, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) lsetxattr$security_evm(&(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000280), &(0x7f0000000300)=@md5={0x1, "4f83464ef9d3d656d2c08207932eac21"}, 0x11, 0x1) faccessat2(r0, &(0x7f0000000340)='mnt/encrypted_dir\x00', 0x165, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616eb7dbdbef8e1a81337da38c", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=r4, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=15d1fb27-7ab5-2c03-5304-afcb018f,\x00']) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:51:55 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x7fcccefc2000, 0x0) 18:51:55 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000100)='./file0/file0\x00', 0x1, 0x5, &(0x7f0000000400)=[{&(0x7f0000000200)="8a11dde946b4e8cdee8baadbcf5e1873baf49ba82da9d6649e87e59eab67a48528ff127d5157773203d7413608b5183755c407e299175f92c97041f2903cc62e0941c59c7afe463d86bdaf3a6f5d0a0ee35af99ea84b8b399547173cd70cf1c44b06fe2593a02e6cf2f5d7addcbf02355659e9742848c7724f23802e36da2c3dcc39d75d3703877f24672829e827e8", 0x8f, 0x1}, {&(0x7f00000002c0)="b8eacf3e9c6c90cb4ebc6e3baf7551aa9c556ac9d9b1f91c9d7f779202218a1dd7c06fefb51f3bff361325eacc5797d7084b07c4c54e335b43afc2a54f4996b5b1b147fe", 0x44, 0x9}, {&(0x7f0000000180), 0x0, 0x5175732b}, {&(0x7f0000000340)="1338f62cf200705f8561107a8ebda944b30b8afcbe4df5bf74a394d729935a63c8ae56647ebec5a80b1fae943d6451342de303bdcea678feaa6ac4d9fba44c9cd3ab9a5cbcd85c02acec464b641622e275f931f0fa5f3b35bb0aa825753fa93375d1b893ddbf", 0x66, 0x40}, {&(0x7f00000003c0)='\n+', 0x2, 0x3}], 0x62040, &(0x7f0000000480)=ANY=[@ANYBLOB="6a6f75726e616c5f6173df9754ca636f6d6d69742c7573726a71756f74613d2e2f66696c65312c6e6f696e69745f697461626c652c61636c2c00"]) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') r1 = open$dir(&(0x7f00000004c0)='./file0/file0/file0\x00', 0xc0, 0x96) renameat2(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', r1, &(0x7f0000000500)='./file0/file0\x00', 0x7) [ 2849.041397] FAULT_INJECTION: forcing a failure. [ 2849.041397] name failslab, interval 1, probability 0, space 0, times 0 [ 2849.044392] CPU: 0 PID: 11814 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 2849.045988] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2849.047919] Call Trace: [ 2849.048528] dump_stack+0x107/0x167 [ 2849.049386] should_fail.cold+0x5/0xa [ 2849.050276] ? create_object.isra.0+0x3a/0xa20 [ 2849.051333] should_failslab+0x5/0x20 [ 2849.052210] kmem_cache_alloc+0x5b/0x310 [ 2849.053163] ? mark_held_locks+0x9e/0xe0 [ 2849.054102] create_object.isra.0+0x3a/0xa20 [ 2849.055138] kmemleak_alloc_percpu+0xa0/0x100 [ 2849.056176] pcpu_alloc+0x4e2/0x1240 [ 2849.057061] ? cset_cgroup_from_root+0x220/0x220 [ 2849.058136] percpu_ref_init+0x31/0x3d0 [ 2849.059067] cgroup_mkdir+0x288/0xf50 [ 2849.059958] ? cgroup_destroy_locked+0x710/0x710 [ 2849.061060] kernfs_iop_mkdir+0x14d/0x1e0 [ 2849.062017] vfs_mkdir+0x493/0x750 [ 2849.062846] do_mkdirat+0x150/0x2b0 18:51:55 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x200) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) [ 2849.063693] ? user_path_create+0xf0/0xf0 [ 2849.064807] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2849.066032] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2849.067222] do_syscall_64+0x33/0x40 [ 2849.068078] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2849.069269] RIP: 0033:0x7f371d026b19 [ 2849.070130] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2849.074329] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2849.076071] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 2849.077717] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2849.079340] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2849.080964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2849.082588] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 [ 2849.087506] loop5: detected capacity change from 0 to 27977216 18:51:55 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x7fccd1142000, 0x0) [ 2849.150567] tmpfs: Unknown parameter '' 18:51:55 executing program 1: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) flistxattr(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x4000004) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') [ 2849.183961] loop5: detected capacity change from 0 to 27977216 18:51:55 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2849.388574] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. 18:52:07 executing program 6: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00', 0x20400, 0x81) mkdirat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x8) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0x20000, 0xa6) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r3, 0x200, 0x70bd2d, 0x80, {{}, {@val={0x8, 0x3, r4}, @void}}}, 0x1c}}, 0x4) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0/file0\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) getsockopt$netlink(r5, 0x10e, 0x7, &(0x7f00000004c0)=""/160, &(0x7f0000000000)=0xa0) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000380)={'wlan0\x00'}) fallocate(r5, 0x6a, 0x100000001, 0x2) 18:52:07 executing program 1: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) flistxattr(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x4000004) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') 18:52:07 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) setitimer(0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x2710}}, 0x0) getitimer(0x0, &(0x7f0000000080)) setitimer(0x0, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000140), 0xffffffffffffff00, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_KEY(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x14}, 0x14}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@private, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@private}, 0x0, @in=@empty}}, &(0x7f00000003c0)=0xe8) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x242c, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',version=9p2000.u,afid=0x000000000000e8e8,uname=,afid=0x0000000000000004,dfltgid=', @ANYRESHEX=r3, @ANYBLOB=',cache=Loose,loose,fs\a\x00\x00\x00\x00\x00\x00\x000000000000000001,obj_user=\',\x00']) utime(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)={0x80, 0x1f1}) openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x40, 0x14) chown(&(0x7f0000000040)='./file0/file0\x00', r2, r3) 18:52:07 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f0000000700)) chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r5}, 0x14) 18:52:07 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000004c0)=""/160, &(0x7f0000000000)=0xa0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wlan0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000300)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3, 0xb6b}}, './mnt\x00'}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r4}, 0x14) 18:52:07 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) [ 2861.702703] syz-executor.5 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 18:52:07 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x7ffffffff000, 0x0) 18:52:07 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') r5 = fcntl$getown(0xffffffffffffffff, 0x9) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') readv(r6, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x6, 0x7, 0xff, 0x9, 0x0, 0x4, 0x8f41, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0x9, 0x5}, 0x4, 0x4, 0x81, 0x1, 0x9, 0x1375, 0x4, 0x0, 0x4, 0x0, 0x7fff}, r5, 0x5, r6, 0x3) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x4, 0x7f, 0xf9, 0xfd, 0x0, 0x2, 0x1000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xffbe, 0x0, @perf_config_ext={0x6, 0x4}, 0x204, 0x9, 0x5, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400, 0x0, 0x6}, r5, 0x4, r1, 0x9) chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f00000015c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYRESDEC=r0, @ANYRESHEX=r2, @ANYBLOB="2c64070074467544793f144a9ccc7a70d3020e57d588b6", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=r7, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d1fb27-7ab5-2c03-5304-afcb01cf,\x00']) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000400)) [ 2861.742013] FAULT_INJECTION: forcing a failure. [ 2861.742013] name failslab, interval 1, probability 0, space 0, times 0 [ 2861.743579] CPU: 1 PID: 11860 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 2861.744372] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2861.745302] Call Trace: [ 2861.745644] dump_stack+0x107/0x167 [ 2861.746072] should_fail.cold+0x5/0xa [ 2861.746524] ? percpu_ref_init+0xd8/0x3d0 [ 2861.747005] should_failslab+0x5/0x20 [ 2861.747452] kmem_cache_alloc_trace+0x55/0x320 [ 2861.747985] ? cset_cgroup_from_root+0x220/0x220 [ 2861.748528] percpu_ref_init+0xd8/0x3d0 [ 2861.748984] cgroup_mkdir+0x288/0xf50 [ 2861.749430] ? cgroup_destroy_locked+0x710/0x710 [ 2861.749970] kernfs_iop_mkdir+0x14d/0x1e0 [ 2861.750441] vfs_mkdir+0x493/0x750 [ 2861.750845] do_mkdirat+0x150/0x2b0 [ 2861.751255] ? user_path_create+0xf0/0xf0 [ 2861.751733] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2861.752333] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2861.752925] do_syscall_64+0x33/0x40 [ 2861.753349] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2861.753942] RIP: 0033:0x7f371d026b19 [ 2861.754363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2861.756489] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2861.757376] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 2861.758197] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2861.759018] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2861.759827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2861.760639] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 [ 2861.797408] tmpfs: Unknown parameter '' 18:52:08 executing program 5: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000200)="9c3d11c021cfc95ed5fa17e30f299d8ff088424cc90073387f345e23adcd41d3e4937bdfdf4f051df2bea8ae26554cfc8780679fc798611fbdc4d88d5f3935f1d4fd98eae08068836f360e05a8311d2e6e943c3bcaeac6e3b14222", 0x5b) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000180)='./file0/file0\x00', 0x202001, 0x8) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) fchmodat(r1, &(0x7f0000000100)='./file0/file0\x00', 0x80) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') 18:52:08 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) unlinkat(r0, &(0x7f00000000c0)='./file1\x00', 0x200) setxattr$incfs_metadata(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)="d35b499db5dffc1cd50b0e0bf54b3770fc41447ca35fd2a24b6932b30a34a7542229077092d70cd6d71ac3dbd02dc0a4b6c1fbb34cfed91a777cbd81d0", 0x3d, 0x0) 18:52:08 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:52:08 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) fadvise64(r0, 0xffffffff, 0x100000001, 0x5) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x88000, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') 18:52:08 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x8000000000000, 0x0) 18:52:08 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000000c0)="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") mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:52:08 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 11) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:52:08 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c010000100001000000000000000000ac141400000000000000000000000000ac1e000100000000000000000000000000000000000000000000000000000000f5893317d051b101b35ff3a5936851e1f5575fd23c08c70593a8bef6f095afaf2041edd3cf2de6974d36abac2472f981ed6d099f2e608d0c76d19140b2f06a1c", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c00140073686132353600"/241], 0x13c}}, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) readv(r6, &(0x7f0000000700)=[{0x0}], 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) dup3(r4, r5, 0x80000) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca4b1d49", 0x1d}, {&(0x7f0000000280)}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 2861.925103] FAULT_INJECTION: forcing a failure. [ 2861.925103] name failslab, interval 1, probability 0, space 0, times 0 [ 2861.926771] CPU: 1 PID: 11878 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 2861.927597] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2861.928563] Call Trace: [ 2861.928881] dump_stack+0x107/0x167 [ 2861.929301] should_fail.cold+0x5/0xa [ 2861.929762] ? create_object.isra.0+0x3a/0xa20 [ 2861.930299] should_failslab+0x5/0x20 [ 2861.930751] kmem_cache_alloc+0x5b/0x310 [ 2861.931226] create_object.isra.0+0x3a/0xa20 [ 2861.931780] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2861.932379] kmem_cache_alloc_trace+0x151/0x320 [ 2861.932901] ? cset_cgroup_from_root+0x220/0x220 [ 2861.933471] percpu_ref_init+0xd8/0x3d0 [ 2861.933931] cgroup_mkdir+0x288/0xf50 [ 2861.934383] ? cgroup_destroy_locked+0x710/0x710 [ 2861.934932] kernfs_iop_mkdir+0x14d/0x1e0 [ 2861.935420] vfs_mkdir+0x493/0x750 [ 2861.935833] do_mkdirat+0x150/0x2b0 [ 2861.936257] ? user_path_create+0xf0/0xf0 [ 2861.936740] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2861.937345] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2861.937959] do_syscall_64+0x33/0x40 [ 2861.938384] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2861.938969] RIP: 0033:0x7f371d026b19 [ 2861.939391] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2861.941509] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2861.942375] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 2861.943187] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2861.943994] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2861.944803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2861.945642] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 18:52:08 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000480), 0x200400, 0x0) mkdirat(r2, &(0x7f0000000600)='./mnt\x00', 0x8) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r5}, 0x14) [ 2862.015977] tmpfs: Unknown parameter '' [ 2862.029180] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.7'. 18:52:23 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') (fail_nth: 1) 18:52:23 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) recvmmsg$unix(r1, &(0x7f0000003040)=[{{&(0x7f0000000740), 0x6e, &(0x7f0000000940)=[{&(0x7f0000000480)=""/29, 0x1d}, {&(0x7f0000000600)=""/26, 0x1a}, {&(0x7f00000007c0)=""/98, 0x62}, {&(0x7f0000000840)=""/220, 0xdc}], 0x4, &(0x7f0000000980)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f00000009c0)=@abs, 0x6e, &(0x7f0000000d40)=[{&(0x7f0000000a40)=""/131, 0x83}, {&(0x7f0000000b00)=""/213, 0xd5}, {&(0x7f0000000c00)=""/32, 0x20}, {&(0x7f0000000c40)=""/255, 0xff}], 0x4, &(0x7f0000000d80)}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000dc0)=""/163, 0xa3}, {&(0x7f0000000e80)=""/172, 0xac}, {&(0x7f0000000f40)=""/165, 0xa5}, {&(0x7f0000001000)=""/89, 0x59}], 0x4, &(0x7f0000001100)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x88}}, {{&(0x7f00000011c0), 0x6e, &(0x7f0000001340)=[{&(0x7f0000001240)=""/17, 0x11}, {&(0x7f0000001280)=""/130, 0x82}], 0x2, &(0x7f0000001380)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}], 0xe0}}, {{&(0x7f0000001480)=@abs, 0x6e, &(0x7f0000001640)=[{&(0x7f0000001500)=""/26, 0x1a}, {&(0x7f0000001540)=""/210, 0xd2}], 0x2}}, {{&(0x7f0000001680), 0x6e, &(0x7f0000002800)=[{&(0x7f0000001700)=""/4096, 0x1000}, {&(0x7f0000002700)=""/104, 0x68}, {&(0x7f0000002780)=""/127, 0x7f}], 0x3, &(0x7f0000002840)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x78}}, {{&(0x7f00000028c0), 0x6e, &(0x7f0000002e80)=[{&(0x7f0000002940)=""/214, 0xd6}, {&(0x7f0000002a40)=""/44, 0x2c}, {&(0x7f0000002a80)=""/181, 0xb5}, {&(0x7f0000002b40)=""/35, 0x23}, {&(0x7f0000002b80)=""/138, 0x8a}, {&(0x7f0000002c40)=""/86, 0x56}, {&(0x7f0000002cc0)=""/225, 0xe1}, {&(0x7f0000002dc0)=""/182, 0xb6}], 0x8, &(0x7f0000002f00)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100008002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x138}}], 0x7, 0x41, &(0x7f0000003240)) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) r6 = getegid() sendmmsg$unix(r1, &(0x7f0000003380)=[{{&(0x7f0000000300)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000040)="ce4588c6044ce5ef075720c57f1cbcec94a5a8cdacb2", 0x16}], 0x1, &(0x7f0000003280)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r3, r1, r2, 0xffffffffffffffff, r0]}}, @rights={{0x1c, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [r2, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r0]}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}], 0xf0, 0x4008001}}], 0x1, 0x4000000) r7 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r8}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f0000000400)='mnt/encrypted_dir\x00', &(0x7f00000006c0)) 18:52:23 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = signalfd4(r0, &(0x7f0000000040)={[0x80000000]}, 0x8, 0x0) r2 = syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000380)=[{&(0x7f0000000200)="2795", 0x2, 0x800}, {&(0x7f0000000240)="634079b2b0ae427c40bc030d9f6b22b9ca987e1b1a2669f3392d80f38ec9b1f6b7753acdfd37db8ea3489c76975dfceda295d3f7b4a4b8aef6e5db7419005b870225b377480b057a335610f2fa0e0503bf47b230c861fac7ef75a227fee6a4daa5fd08c46ec7a23949ce1877df019eabc495e01e590e6a34b1b3226c699c593e6717adc91c794c879f457666940e5be63ec244370033501f76fcb5b78bc17a47", 0xa0, 0x40}, {&(0x7f0000000300)="068ac2588a67690da584eaf631435c68a4b971ac60cb8e3220e3716daaf339b2a408252df2c7a6cfe095bb351c6c", 0x2e, 0xd85}, {&(0x7f0000000340)="88ce1df67cffdd0dcb2c21697826c5408ba2e5f80d02e5", 0x17, 0xfffffffffffffff9}], 0x20, &(0x7f0000000400)={[{@uid={'uid', 0x3d, 0xee01}}, {@block={'block', 0x3d, 0x600}}, {@utf8}, {@iocharset={'iocharset', 0x3d, 'cp949'}}, {@map_acorn}, {@check_relaxed}, {@mode={'mode', 0x3d, 0xffffffffffff6b20}}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}, {@hide}, {@map_normal}], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@appraise_type}, {@obj_role={'obj_role', 0x3d, 'proc\x00'}}, {@measure}, {@uid_gt={'uid>', 0xee00}}]}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r3, 0xc018937a, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0xffff}}, './file0\x00'}) mkdirat(r5, &(0x7f0000000500)='./file0/file0\x00', 0xda) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000540)={{0x1, 0x1, 0x18, r2, {r1}}, './file0\x00'}) r7 = signalfd4(r2, &(0x7f0000000580)={[0x3]}, 0x8, 0x0) r8 = geteuid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r7, {r8}}, './file0/file0/file0\x00'}) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') 18:52:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x2014d1cc7f0000, 0x0) 18:52:23 executing program 6: ioctl$F2FS_IOC_SET_PIN_FILE(0xffffffffffffffff, 0x4004f50d, &(0x7f00000000c0)=0x1) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000140)=0x1c) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000300)={0x3, {{0x2, 0x4e24, @broadcast}}, {{0x2, 0x4e22, @local}}}, 0x108) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x400240, 0x11) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000200)={{0x2, 0x4e23, @rand_addr=0x64010101}, {0x1, @multicast}, 0x6c, {0x2, 0x4e20, @private=0xa010100}, 'netpci0\x00'}) 18:52:23 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') 18:52:23 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 12) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:52:23 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000040), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x5}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x64, 0x30, 0x33], 0x2d, [0x34, 0x33, 0x30, 0x31], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r4}, 0x14) [ 2877.423980] loop5: detected capacity change from 0 to 8388096 [ 2877.441181] FAULT_INJECTION: forcing a failure. [ 2877.441181] name failslab, interval 1, probability 0, space 0, times 0 [ 2877.445093] CPU: 1 PID: 11912 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 2877.446605] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2877.448362] Call Trace: [ 2877.448933] dump_stack+0x107/0x167 [ 2877.449714] should_fail.cold+0x5/0xa [ 2877.450537] ? create_object.isra.0+0x3a/0xa20 [ 2877.451506] should_failslab+0x5/0x20 [ 2877.452307] kmem_cache_alloc+0x5b/0x310 [ 2877.453178] create_object.isra.0+0x3a/0xa20 [ 2877.454127] kmemleak_alloc_percpu+0xa0/0x100 [ 2877.455076] pcpu_alloc+0x4e2/0x1240 [ 2877.455878] cgroup_rstat_init+0x14f/0x1f0 [ 2877.456790] cgroup_mkdir+0x706/0xf50 [ 2877.457610] ? cgroup_destroy_locked+0x710/0x710 [ 2877.458634] kernfs_iop_mkdir+0x14d/0x1e0 [ 2877.459513] vfs_mkdir+0x493/0x750 [ 2877.460348] do_mkdirat+0x150/0x2b0 [ 2877.461130] ? user_path_create+0xf0/0xf0 [ 2877.462034] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2877.463181] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2877.464289] do_syscall_64+0x33/0x40 [ 2877.465077] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2877.466179] RIP: 0033:0x7f371d026b19 [ 2877.467019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2877.471027] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2877.472650] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 2877.474210] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2877.475814] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2877.477326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2877.478915] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 18:52:23 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:52:23 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x440000, 0x2) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) [ 2877.523534] loop5: detected capacity change from 0 to 8388096 18:52:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x20dccecc7f0000, 0x0) [ 2877.527290] proc: Unknown parameter 'uid' 18:52:23 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') [ 2877.628197] tmpfs: Unknown parameter '' 18:52:23 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='hpfs\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') 18:52:23 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)=ANY=[@ANYBLOB='fd,rfdno=\x00\x00\x00\x00\x00\x00', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',dfltuid=', @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=r3, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d18b27-7ab5-2c03-5504-afcb01cf,\x00']) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:52:23 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fcntl$dupfd(r1, 0x406, r0) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r5}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@local, r6}, 0x14) 18:52:39 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) umount2(&(0x7f0000000440)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) setxattr$incfs_metadata(&(0x7f0000000040)='./mnt\x00', &(0x7f0000000300), &(0x7f0000000500)="ed53fa649bc6be6dec58f75331d091d136d1fded04b00cce44ad95213a50ef9696119431a774303619799e09d3e587882d5c5a38a460c120686c49b57a61ee0dc9bff7624c8931b880689a952bf9dacd060187497a09b8468beefa92130dc6bbd27e24694ede91450d836cb480e233478f2027432c09228f209fb1d8c5169ecccbb22df0ab319a861c9dcd541477e7a094db2f36937a48583ca544ed46e3a2874220dc0047322c1641a1a5752ca9c9e583b099d0aab9423378507c84635a9cda8502f9a95136f25355ac4c11014690", 0xcf, 0x1) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000700)=ANY=[@ANYBLOB="74616e73d8d04c0b0355b3c51133c6f58e6fb3e966642c7266646e6f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',dfltuid=', @ANYRESHEX=0x0, @ANYRESDEC, @ANYRESHEX=r3, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d1fb27-7ab5-2c03-5304-afcb01cf,\x00']) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r4}, 0x14) 18:52:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 13) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:52:39 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x20fccecc7f0000, 0x0) 18:52:39 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x6280c2, 0xe1) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r3, r2, 0x0) r5 = ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r6, 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r7, 0x0) recvmsg$unix(r1, &(0x7f0000000640)={&(0x7f0000000300), 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000000480)=""/36, 0x24}], 0x2, &(0x7f0000000500)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x118}, 0x1) getresgid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)=0x0) fsetxattr$system_posix_acl(r5, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000740)={{}, {0x1, 0x2}, [{0x2, 0x4, r6}, {0x2, 0x6, r2}, {0x2, 0x7, r2}, {0x2, 0x0, r3}, {0x2, 0x2, r3}, {0x2, 0x7, r7}, {0x2, 0x3, r8}], {}, [{0x8, 0x4, r9}, {0x8, 0x1, 0xffffffffffffffff}, {0x8, 0x3, r4}]}, 0x74, 0x3) r10 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r10, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) openat(r10, &(0x7f00000007c0)='./file0\x00', 0x200000, 0xa8) write$P9_RREADDIR(r1, &(0x7f00000001c0)={0xc5, 0x29, 0x1, {0xfffff614, [{{0x10, 0x3, 0x7}, 0x1f, 0x2, 0x7, './file0'}, {{0x80, 0x4, 0x6}, 0x8, 0x3, 0x7, './file0'}, {{0x40, 0x4, 0x3}, 0x7, 0x9, 0x7, './file0'}, {{0x40, 0x1, 0x4}, 0x3, 0x7, 0x7, './file1'}, {{0x80, 0x2, 0x8}, 0xffffffffffffffff, 0x20, 0x7, './file1'}, {{0x40, 0x2, 0x8}, 0xc7, 0x58, 0x7, './file1'}]}}, 0xc5) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:52:39 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') 18:52:39 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) getdents64(r0, &(0x7f0000000180)=""/185, 0xb9) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x10, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x41ac, &(0x7f00000002c0), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000080)=@IORING_OP_POLL_REMOVE={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r5}}, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f00000000c0)=@IORING_OP_POLL_ADD={0x6, 0x4, 0x0, @fd=r0, 0x0, 0x0, 0x0, {0x208}, 0x1, {0x0, r5}}, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000280)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, r0, &(0x7f0000000100)={0x1010a0, 0x102, 0x1}, &(0x7f0000000240)='./file0\x00', 0x18, 0x0, 0x23456}, 0xb5a9d800) 18:52:39 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r1, &(0x7f0000000400)={&(0x7f0000000040)={0xa, 0x4e22, 0x5, @mcast2, 0x2}, 0x1c, &(0x7f0000000280)=[{&(0x7f0000000740)="5351703c6322585c8886e02665cdf1a07612f52fcbd8d0aa348df6a9668657a843a2cea23c72e6108a26c8c02d4e9dad4ef23a14341dc674226969d55b5ad34ed7bb3ee769c8c1faa1115e2d9d8c9b58fc85d8ebd17dadcfb85378b8db6d62eb59a0347190efaa0efb820eda760e14c689348f93c99a506696d469de82fc7c0e419164cb8d52aeb43797a797a47e475ff27e8d196aebac707e47240aced221fb1ba1514c035dc7945dfa72428df79965efe16cf83972fd0418a78f3af3effac6df7a8f308775bb279129465bc6651a46f293736a99cb801f1b6df7", 0xdb}, {&(0x7f0000000840)="c8a1b01da50ca26d674821eae8dc2d024c33970bdca2d78ef38251ed20f7545d64f01fcbc664516e6b09560b6e8c05beff91170079cbdd2c7b8fce626d227894ab8ee79bb3e32508d9bf5e930fc71d29961cdb2399cf797836b948ec68d37917c4bff53f2b08ed085aa4e66e13ab7e856a97ce72987fbb8a7e48262c33907007e54478285a3c3899773cb850df608d9a3b55a65998060be4c258a99d1734b821dcf5beba619d00398601aa7af916329850da277106c81dc5b450c7d96e6e4b4fea25", 0xc2}], 0x2, &(0x7f0000000300)=[@dontfrag={{0x14, 0x29, 0x3e, 0x1}}, @flowinfo={{0x14, 0x29, 0xb, 0xf95d}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0xca}}], 0x48}, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:52:39 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@tipc=@id, &(0x7f0000000040)=0x80, 0x80400) lseek(r1, 0x2, 0x2) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0x66, &(0x7f0000000180), &(0x7f0000000300)=0x4) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) mknodat$null(r3, &(0x7f0000000100)='./file0/file0\x00', 0x800, 0x103) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') [ 2893.163832] FAULT_INJECTION: forcing a failure. [ 2893.163832] name failslab, interval 1, probability 0, space 0, times 0 [ 2893.166395] CPU: 1 PID: 11957 Comm: syz-executor.0 Not tainted 5.10.234 #1 18:52:39 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0xf0ff1f00000000, 0x0) [ 2893.167871] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2893.169717] Call Trace: [ 2893.170367] dump_stack+0x107/0x167 [ 2893.171298] should_fail.cold+0x5/0xa [ 2893.172229] ? create_object.isra.0+0x3a/0xa20 [ 2893.173383] should_failslab+0x5/0x20 [ 2893.174312] kmem_cache_alloc+0x5b/0x310 [ 2893.175330] ? mark_held_locks+0x9e/0xe0 [ 2893.176181] create_object.isra.0+0x3a/0xa20 [ 2893.177102] kmemleak_alloc_percpu+0xa0/0x100 [ 2893.178039] pcpu_alloc+0x4e2/0x1240 [ 2893.178862] cgroup_rstat_init+0x14f/0x1f0 [ 2893.179766] cgroup_mkdir+0x706/0xf50 [ 2893.180561] ? cgroup_destroy_locked+0x710/0x710 [ 2893.181542] kernfs_iop_mkdir+0x14d/0x1e0 [ 2893.182404] vfs_mkdir+0x493/0x750 [ 2893.183176] do_mkdirat+0x150/0x2b0 [ 2893.183933] ? user_path_create+0xf0/0xf0 [ 2893.184804] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2893.185893] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2893.186974] do_syscall_64+0x33/0x40 [ 2893.187751] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2893.188815] RIP: 0033:0x7f371d026b19 [ 2893.189589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2893.193474] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2893.195082] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 2893.196569] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2893.198052] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2893.199541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2893.201017] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 [ 2893.210334] tmpfs: Unknown parameter '' 18:52:39 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') 18:52:39 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000340)=""/185, 0xb9}, {&(0x7f0000000400)=""/21, 0x15}, {&(0x7f0000000480)=""/14, 0xe}, {&(0x7f00000004c0)=""/60, 0x3c}], 0x4, &(0x7f0000000540)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x118}, 0x2001) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x4, 0x2, &(0x7f0000000100)=[{&(0x7f00000001c0)="a67057ae5327db7112dc9dcf48e52a7f66d64a8670f88ec50d6ce0823252377fe78972921995ebaa1540b111210affd47def6f0bd3031ad3472dfed0dfb3a8a43569fa74f485bf30ba0402975daec4b56322e8b41a798cbd", 0x58, 0x2}, {&(0x7f0000000240)="8473092a65cee320f50845a9ce177c656af13ef6b06c77a5307ad3f2f0a2790246e858eefe6e007b9fe521a68816750a703f5cea8fcd164d21a4372eae6d6b105ac8f7d80a079dbf024e89a7bd21e2e01dbf18e65d8bf1114f55e854b4a31610d7de7cae04ab1d7e4d9762985325cb9bb481adb29fb0161b20ce37c42d4297ff78895797d2302d9a5cd06315dde0d084d51a11c9c201b37a11dd2e3ac35f47ece16fa46f1207109661b0c83581759564e4e5c5631184f37c9b88e8033fd3ca561df248c757d30c995f9c4a0201a24bfda0c7", 0xd2, 0x1f}], 0x800, &(0x7f00000006c0)={[{@check_relaxed}, {@uid={'uid', 0x3d, r2}}], [{@appraise_type}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x65, 0x64, 0x39, 0x62, 0x34, 0x31, 0x36], 0x2d, [0x35, 0x64, 0x62, 0x65], 0x2d, [0x63, 0x36, 0x32, 0xa222c3a6405a28aa], 0x2d, [0x66, 0x0, 0x66, 0x62], 0x2d, [0x31, 0x6e, 0x33, 0x61, 0x8a82461c62d19816, 0x66, 0x64, 0x39]}}}, {@dont_measure}]}) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:52:39 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x242c, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}, {@afid={'afid', 0x3d, 0xe8e8}}, {}, {@afid={'afid', 0x3d, 0x4}}, {@dfltgid={'dfltgid', 0x3d, r6}}, {@cache_loose}, {@loose}], [{@fsmagic={'fsmagic', 0x3d, 0x1}}, {@obj_user={'obj_user', 0x3d, '\''}}]}}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r5, r6}}, './mnt\x00'}) 18:52:39 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0xf0ffffff7f0000, 0x0) 18:52:39 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:52:39 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000002740), 0x40e481, 0x0) openat(r1, &(0x7f0000002780)='./file0/file0\x00', 0x800, 0x10) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) [ 2893.377979] loop5: detected capacity change from 0 to 135266304 [ 2893.385114] EXT4-fs (loop5): VFS: Can't find ext4 filesystem syz_mount_image$ext4(&(0x7f00000016c0)='ext4\x00', &(0x7f0000001700)='./file0\x00', 0xfffffffffffffffb, 0x6, &(0x7f0000003980)=[{&(0x7f0000001740)="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", 0x1000, 0x20}, {&(0x7f0000003ac0)="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", 0x14e, 0xc000000000000000}, {&(0x7f0000002840)="de6dc4a77b8b0e7ec623851c188bc6c20752411ddc6dafb1feedec75c11133889283e218a06295f6433ceeaf0c3fe29788a445e18a", 0x35, 0x800000000000000}, {&(0x7f0000002880)="e45b5371993fa001b110c70e1a82d14585966236b208c367085e6b1dffa4478b6f39dd00f08625c6125ddf21b3bed4fad230461faa46f56c5c58d5ae12165ea7199f93f0d66bdc29a0c630a1fa523b02280fea9432c49499f09af80a1820310af859e29a8c6aed99903dc83eda58436588ebff819153e7cab611fc76b76a78ebae0c92a21352b911c12b7b4dc8370d694282b08d493a22bdd902b527c4b7537453a48db1e2a7e50548e8a128e13e7731fbfbacb55ec1c77fa6003ea996f3c908e6fdd034c7b071fd61d173b328d45c30a996ea393f07946b0649a9b3965cf482b574c843b42d2d1117fd8b4db85cdd871ac464a2e3c3c6dc413826980606561804b88ea9af1a530bf756827fccf300cad46292eb03c6ba16d002fd798080a365c674b5554a5a58e80ce3d0f62f9b4f9a04535cb3deee6526c78bc7a37bc7ab7dccd44a60dc14a4635c2cd6f776ca487c21bc4f26bac3c952655f6cc3f7deeb1664ac588b96a116e60022d2527f7d68c933b680734583dd5a3f8c6853c51048f83c878d99c1e40c14d42890d1a3717ac29f69ad1b96395e60c872c89659e9fade3a7fbb32412e6a1d5357007124dc6dcb9365bfc670a8f99c0dd5da7d7477042f9548081aa0846658b999c7aa995ac44cb9585488ee73bd1a37afcbab1a4062cdaf6879ff0323fe2be1d4b0433430f7bd092b75c36262ce9df42107acadcc004605850221b0afb90ae74556e204d3921c213cfa51758b1efbfbb4d62e39cb15a700b3cf56927e51c89596258296980b6928cec6f77227c7089a0ad1bc6cf1ad822297d63fcc7f51fb1d0ac8b55387068e155479904166ffa0806477d0df2b282cd7742ee8655bc47a632c6d8746c82370acc7e20b9359091e446b40d2f7c709d80310b770fa6a4af0b81fad1c11990a1b2982a738e0b651686caad7a3e802189462335a83867262fe27f913c2e995eb22ed2514eef6d6c85bb84b61199155e6662576ff4b305d4289dad513b4d6b8dc8c1b95ca9a6e874f1c69b5107f14124572594bfa68daa7847e45b3fd93e228aaa54f5ff6c23a25e0d72e96fb75fa87a44a6196dc586b476817869549e9eb24fdfb41b13b60e3782f5f0a26eeedd6cedc7919f171c101e7897fcd6f68ff0296fbbf3deaec0f5e26ea58123e4abcde8a1bc0def0117b24a039df05255789194979c8478739b902925c923443a3cebca9a00b46a3fe29aa9472f6f602e444c4dff6fc8f695f31af2071957c60a6ed07e92ee9e5611c2d65eb4115011562706e46610e2b60c4965f5f91127b7fc329e3bc17d7f073e2834d841aad9543a14d6d307f3950b25915474fc4c75d94bc0aa0d4ab50cf45b0aa900cbdc87e8a9de196fa1e1a1ca6ea45cf0eb881154228d8c51fb11814a82e8c7f7a9c2445fa87b3f08fd4e4dc066691a139084df10d49567ddd06e5250b9137f1a543342f2e082051675338b0215c4c0164e476ec6012be61ef5492444accdbe549d0e8f9d2d188479a1b95d16e7a5f35be01c02f981a833f6564aa27b7eaf0325c52cb2dc3817eecd64724eb54b473def33d2d010dd2055519907e4d49a9e969bc9c44d78b26a7a24fc6c14740f474b4c8906dabcd301e0fd987f6b05fc0f2b001e8072ca2e33c86125256b7ac598f542df3db20d2d1cf611bc884a5029f9015b05bae1c443516b0ea4b2c2c6a0424ea4c259b120d148178965c56ae7e9bbe700cca28f4cb1c02d3c3455717b1504303992b0234bf5d94a99fd2212bd316e4b01afe70a1c35f3972cf3ada9bbbe10f43d0e209ce1c9d70b609233717368aec030437304705d033eb68fff40a39f9880eb901fc7f91479a7538cd79aeb06c8daa43eebe4c0015e9763e7c6f280fe53a6334663a9e0951e59a8c0d74e1ccd75407ba3c47732d2bfdace90ab30a1d7a25151334806228387c069121a9bbc8ac1fbb460ac4c24af7be295215d12f88a98c62991ca76ac678fc757fc8e0b3b801f65c3e485ddd13cd33b40b98c4e19c6e1e189b59fb45765ec2c7a1d23147c8277d2f8e0cf901785ceb18dae40f0cdebca22271428ff2bf13f2c051f591cf2b93aeb85c421c9df651d8616e93ecc00db04adee2a146889bb823eb02ad2bb934dfb62f45ae2d17962fcbdb0badfe81ef697644422c7af064ec43f68aa72b4e7d3f2e945e7e784c706a0ba0354373e9704bd23cc8cc95c4030f710797b9cf39bbe38995cb817f871d73dd949453ea1f98f53c9b62c5040175d9da0827579017579c64b4ff59ab3526bd41756f70e97b475d788e10082e54bd83a9dab2ce2fbf9b556bca594763ae6a4889e45ac9d2ca1715ad84a0bdf725d50859ad7de55a1cfb648ed6338215793b4fc0979115994f2d1737b45dfe78f5f7970c9819b5c07ccc8da17b6a6786bec7f44b980fc6be85fb3c05716dbb0d07d47db205a9583159b5c8265ebfb61a1a1967b54287123dd2c4a0487748caeeeace1461b1e865434b80ff614cc7e9cee96cd83e363e5964d712c433e32321cf00e86590e7a3905201217f7f269ff048be267b9d2d42b6d49552a1297bb9f9908560f2e2a1fd8bf1f2842fbbde06f0c160e006e3354deed1818afee722c0cdb53ee4b21c7d67b67ebe367da6569ad266c860af4caa4302f24cf966df35970828c7d396734a98a688200634617dc5404f3325f06f11daa6d969b8246425cc55c7f5f605bec2b2d3788237a4bff1725e09f83bbf7f972aec0d6a0235c7c33c6e201fca21e94ca405f66626821ff1f1a572a521f443f6a3ccbfdef7f1a3b5afebc9aff643fbddbab98187321bf84c7b327e58fe92a7041a7a88ba03422bbf7a6720e19315dd350a67c5f5d4bafc86c0a6a702b702c96c49ad47dfb99f18fca6c32f44482e9fe0096fa02dff90f4c1f01c23475cd47e6bcbb39c31bdc3a2f1692ee308d1183cee23d386ff28015a85bed59787d738535134e94cffa3cf0e9d804d795c1904f2e5e278a70660402e2cd1eee44c6eaf8d282a66376e28acc1e88214c3cbb4a4a5d6526f50708b28fa3db40f549931de37a88e0c8ff96bd87029495b05524396f806cba9e0944c42b92fa74bdce568d49952159cf21178734022b676607ed216c8a7efbb04640666eac71de7a347dd0c9658bd8e803dc39f102ff91ff93029cacef6c5d38c5b3363bcfcfd139934f87f2855a68c84989ce09f980a73585361574025ea7597841f92185e4190e05c3053ac6e4aa4b7f30d0b6f5a85389b9e99c39ae2220a29136d5b1a83632c81f63993c7afa6c7f59c6a0501627dfe23f7c40ed927c4fd0d52fae32262a78449fd6f875ac30160a54b9f7179a34facbf669c39e93bb77734ccff041bd6874e36e534583a303f4750bacb9324514ea1eecdb2fe9731b87d6759eea7d360d9cbd3e94752d1e78d2604a212b4a3b3374495b48b148034347fff142827b6771a0bbbe65926cb45f59c2a6b9333657afd5d8ac19785510108945b288e1ecadaf51c3ec12d1ec00ba9e107fecbe69c81cf45af77dd50572fff45ae8771241cd67049521f2099dca89d9f3c448098888852c4089039b642da281f0fbb3d5cd112f7136b9312e0ef6a11f8df99bae75655cc61b0ab7e1aa05174400bdd752cfd60fff7debd93ddba3eafe2e820051010c96e2ddc773a35708168274f27b763527d94fb56228a6c13f4a24cb8109526a29cc9c866dd124dbd652ac7567a059cf73949f7ae766866a633e8fe57ee6c1701c199b6937e14d43843a0df754f4abf55146d71e84aa2316a62e555af251c90993d8fbcd4a5018340f5bb13252da46c3a6188cecc6cecde66b41e807fa2e336c536c59468d4ea4b0cadbd9da38aacc1603768e2a9f87125ae7c67400283d44f064cefb8e8f365d3f5137af9529226c524509123dee15514f9e53c8e3e195fe24e6631759c95b5189fa7527e33898639c82fd42eaa7164d30957771b30872f7e7f878957913ea9da87de25165de600a4ae733d70a98db815735ddff57ece7d865cf780f927078761d380113b3e1c83c10c0ddd0862d5f7628a170decc0eb0757fb5cf1ed4fb77aca91fe693ad0d7a2ad84e42daa259631bfbb070ae2ba638575f77c72e595473a0349c83e1212c449869b65ee1aaccc12db83df0b957cdf554c22d3129169ad597b582e5ff2a7aa083ef340c1d9b9442d5c464256615fc59e1d108a0d483468a6d61a1e2b524d7ea6fe0c4c85fc799c2d257c4bf50d576e1ed012aed856b05cf7085766facf99f02aa8afdf18c3a12f4636bb82397f9c6447ca785b9526d869f6d6492e653ba26641165a6972ed5bf5bc815e95447ce9c7bcebb3c58c5ff042f6b5d512ebd243bea5f95974a4c718be5d6ae630c02c1528cc9d267db8ece786dd104472a28d7ceff39a5ccc40d31848a0630a701f4e80beb40c4a5ed1e5989c8c393db3361ca8fe47d869f36f5c8062976a34a3f649d48abef8035146dd55a3b0d1112f4715bf309082d5f67450a22924f541f8ab263217d459500992ca92e701835cec065abc3442a7c9b7cf69b4f31a6c70fb7a17023cd0abdbbc0927b7cc91eac27109acdb656296575981bcbf9ccf4c0a031c8341b996a8bfa502187a8d7165691d2b6a5da12d74e58020c1a1528d616a3cbba9f4b681c3e53f9cec68a3b2862c76965fac40d0812c01296293c5485c8a67aee5dd869d064c1ffddac24641c92f1b32e80795881d221ca836586167a4323d52ed55180eac46482d8cbb7e91527d612912bf3cedf0eeb7a197ce3d9bd7f58001e1a7dbd242008e41dc69ce61400b5cef53d707f87c3b1f8d7c56fc6f9591b4ce67a4d87cc65ff24b019b293d1f485ab9542fd42f6c6b40c1ef6a0eb8242ef025c6e43cb6ec7955f09c572a8af8755334ea42b6d9e0662e12f4a0894a8c9b6ad9c746c38b3e04baa41e202fbdab6bda354beea5ea548f09662fbee88c4cf1cd53c40f61da5912c93f1704f9a0181448152f478a40310daec0afe58d68f54474b3a84ab3ed5047f811896ffacee58fca2e6354fdf57404a71856309600f8c982d8f6254b5ee00c3a4a5dcb399c627ab6bafc638484aa53d21b7677ef6bbe152429895625659acbfb7258924f6abe0b2c0cecde80c0be8b5f0bcfbb01b44dd5b7e0c6760706664b83de7a00c413e4055bbca448e9f12cab737b9dd2254fbfd550d9d81a93f2ac42c87e7dbe4db245a77c86122549d2d53b03ba64c0f894244f0987cf7cfb7255ea242da975481efd96d17ea1b5d8d713b8ba2809e4f88e956995a1b5a8f7c2243f3813aa912cc3873fd18781c58e9cf53273172481b899f24e61230ad6ad9eeea6d5e6bcd26fb99d7c39e313f5a0e3af50871ae14029eee111c06e48461ce4913b9f785297e611c5e24bcf6fdc8d5ab7071661c67d89673fe10ae130a024a8d1300ecfcf23c180c26ad22eb35b87e1b63a8ef609fa9a86a6659739fbb6fa2c445056ea9604e855d4db418e872b84994b1becbc14ab1fb1d4fac7d601a36043a6fd274b74726e88e1c36c168d074789336875e6723f49219e4bb4409a2ae6ef3e4ba84d3ee313ee7eda0838e06da3b015c8eaffd6df26f2e482fa6adb2a33f6191d689076e2514a1185791b460b6aec600d8bbbfce71120147e98b2257c881ad7a2fa9691d7453899f158e878bca173fe43ccb569a700c2543b0e382b594154fbe87d74b24ebed7e24d08b652df05190a2e68c551ca8b93e88ea1ffc750ac8c5d054123710ccb21643445aab1ff20fd4abf4d9419dce173ac30bb12153368cb5e72ab3582f53b34d2191756d0d6", 0x1000, 0x8}, {&(0x7f0000003880)="b8af0e7290bd973e1535e1f4807aa5fa029bb29aef7ac68185f62c3af21006cf236dde99498ee9d83a19d4e1442c762b0e7905419f292a2afe98d5484d167e7c0a736751639c623bd86528956db2d2b1acdbab9c5505b0a41faf904310671fc42d4ed104a204928f06d33e7c103b42922649e5fd118ee7495bebf2817829374c77979f20c86640914d11d037e4", 0x8d, 0x2}, {&(0x7f0000003940)="6f3a3cfb0e6eb4c64a1e9768b726040eeacb30030cae4db6c7c24aeaf45a4669d1c1205e75", 0x25, 0xd}], 0x0, &(0x7f0000003a40)={[{@usrquota}, {@noinit_itable}, {@orlov}], [{@appraise}, {@obj_role={'obj_role', 0x3d, 'vfat\x00'}}]}) openat(r0, &(0x7f0000003a80)='./file0\x00', 0x404000, 0x40) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') r2 = fsmount(0xffffffffffffffff, 0x0, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000100)='./file0/file0\x00', 0x1) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000240)='.\x00', 0x400, 0x4, &(0x7f0000001500)=[{&(0x7f0000000280)="4804e4ecbdcd3a4fc7a016efb7ca26b866bcc679a4d507057e4a1b992ab0f83b2b914d4184ff53a336baa15d723afe9536e0736075ce40523c192553035d9c04b87a1f57e9ad4bae451c96bdb951cc74d1303b8c161db9c1d58ef17bc0555bc1200094ee231716104ef4775a2f335f1f5069ccfcd88beab11c1fab7feb494a5ebcc2adfda023441341b6e6aefdc18111ad45e9c884db9801274ccf5f4762c0e1c5a412c6987bf0f3bae861b744245454fb51e3c277b508d51890478a189d09454b59d3ed79b3ddc61854cad7acc418f81850ea93cfe2c5", 0xd7, 0x7}, {&(0x7f0000000380)="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", 0x1000, 0xb6}, {&(0x7f0000001380)="7c97e34cd29111a944930c904a9ae22b34d0be6e7744c6360aa544f8133b07000089c27012ab75a9086382e7ba239686499229865783e70bb2854f6dc7c28311efcda9167f3d9c1fdcc6150db16e09bf0ebb137d625d9da454fd6145b4408f51b335", 0x62, 0x40000000000000}, {&(0x7f0000001400)="0701d7d42c03dc85f6eddda1e8e8c23dcaadf566a148c5f2ee522105f263d385683eb06cffc4e3ae0aa6d4dd96ac2a305a42ac3b46b6ffd2501a8a00924575c15aee221e9ff05d68a61c40f6514c8a0d233881c30465459e56d13cc67be166040b81fe5bf9e30f653b9398cc8c9d7fbec283ecf1eef85cbb1fd02f1d6403d6d0344b049c1f65db17d2030c9ba6d1bf0b89b84d842a7f6c0007fd2c7530082e8aa2c866df97491dcfbb058b9aa2e036fb4c06ac4a8e68cd7e1ab7574b893f2a080dba3d53143620fa46d147d888287cbb22de20955f8c8ea189e7b5", 0xdb, 0xcd}], 0x104400, &(0x7f0000003c40)=ANY=[@ANYBLOB="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"]) 18:52:39 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000002c0), 0x6}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') openat(r0, &(0x7f0000000300)='mnt/encrypted_dir\x00', 0x12002, 0x83) chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=fd,rbdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=r4, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=7\x00d1fb27-7cb5-2c03-5304-afcb01cf,\x00']) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lsetxattr$trusted_overlay_opaque(&(0x7f0000000340)='mnt/encrypted_dir\x00', &(0x7f0000000440), &(0x7f0000000600), 0x2, 0x3) sendmsg$nl_generic(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000700)={0x124, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180", @typed={0x8, 0x55, 0x0, 0x0, @u32=0x8}, @typed={0xfe, 0x94, 0x0, 0x0, @binary="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"}]}, 0x124}, 0x1, 0x0, 0x0, 0xc800}, 0x4008000) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="f48ce48c40dd3a3145", @ANYRES32=r6, @ANYRES32=r3], &(0x7f0000000400)=""/14, 0xe) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r5}, 0x14) [ 2893.414663] loop5: detected capacity change from 0 to 134217728 [ 2893.434925] loop5: detected capacity change from 0 to 135266304 [ 2893.441389] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2893.459954] loop5: detected capacity change from 0 to 134217728 18:52:55 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) openat2(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x74b180, 0xad, 0x15}, 0x18) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x120) 18:52:55 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') r2 = fcntl$getown(r0, 0x9) syz_open_procfs(r2, &(0x7f0000000040)='net/netfilter\x00') 18:52:55 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000300)='mnt/encrypted_dir/file1\x00', 0x3f, 0x5, &(0x7f0000000880)=[{&(0x7f0000000440)="af7d4a89124ced822b258885cab792c96f31b2d0d27be99578c541c5f19af6721fd2a25fc8169802b95b3784f4507defd4890c8b2d64760e84e8eb2704776a3746cbb5efc3baaf13f8627d8054d70a5b7f28cb3f6b78c41266d545ec1921b11b76a6b23a6f51bf323a4b8f9b69a81869", 0x70, 0x101}, {&(0x7f0000000700)="5d02a0395b832316e31005f297eb8cc6990a9b23d7b0b25b6f81db5a268933c577dee54c920d940d7f5e1f24cbd2771a6c966251a38c2471ef1e4dbb5c7a6cda91257adb24e55a5afa30d11c7f8f008422c90875605889c8920cf064c47816a52b2ae916de6e03d5869aee3af28aa178cb21db7078910fea6d7289361d59c1cdc7c94403e3ef83f3982d7a7e12111d992349c46dbb93d98245aafef099f2a25c2c817a19d414ba8d0fce87b45575c00181c67f6a3fa47efa428ba590", 0xbc, 0x81}, {&(0x7f00000007c0)="7107a8949660f5f6b7641d434d7459b4b12cd998e53d5879afdf69499b75ab5cae2da0c428c8037ae05fe30ca21b10f30ebf11b500e2fdffb6f9fd1d309d2a6b309a8f1f8f7c56", 0x47, 0x80000001}, {&(0x7f0000000600)="040d0eb850d67e66f8c471691841135b0d509d89a2996d52c888fe5cd7499d432d38", 0x22, 0x9}, {&(0x7f0000000840)="89784482fa2ed0f4970563ff625df0436f9af38c533059ac0a9585e373", 0x1d, 0x9a}], 0x204000, &(0x7f0000000a00)={[{@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x6d, 0x67]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x35, 0xc, 0x67, 0x25, 0x67, 0x25, 0x36, 0x30, 0x32]}}, {@size={'size', 0x3d, [0x31, 0x0, 0x35, 0x30, 0x31]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x39, 0x37, 0x6d, 0x36, 0x78]}}, {@size={'size', 0x3d, [0x25]}}, {@mpol={'mpol', 0x3d, {'default', '=relative', @val={0x3a, [0x37, 0x38, 0x32, 0x39]}}}}, {@mode={'mode', 0x3d, 0x80000000}}], [{@obj_type={'obj_type', 0x3d, 'fsuuid'}}, {@appraise}, {@obj_role={'obj_role', 0x3d, '+'}}, {@smackfsroot={'smackfsroot', 0x3d, '%-[$'}}, {@appraise}, {@measure}, {@dont_appraise}]}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f481f5737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r4}, 0x14) 18:52:55 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x280940, 0x0) sendfile(r0, r5, &(0x7f0000000280)=0x9346, 0x8) 18:52:55 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') 18:52:55 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x100000000000000, 0x0) 18:52:55 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x400000, 0xa) 18:52:55 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 14) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:52:55 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') [ 2908.869279] FAULT_INJECTION: forcing a failure. [ 2908.869279] name failslab, interval 1, probability 0, space 0, times 0 [ 2908.872234] CPU: 1 PID: 12018 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 2908.873858] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2908.875804] Call Trace: [ 2908.876454] dump_stack+0x107/0x167 [ 2908.877334] should_fail.cold+0x5/0xa [ 2908.878258] should_failslab+0x5/0x20 [ 2908.879160] __kmalloc_track_caller+0x79/0x370 [ 2908.880368] ? kstrdup_const+0x53/0x80 [ 2908.881264] ? find_held_lock+0x2c/0x110 [ 2908.882208] kstrdup+0x36/0x70 [ 2908.882958] kstrdup_const+0x53/0x80 [ 2908.883882] __kernfs_new_node+0x9d/0x860 [ 2908.884809] ? mark_held_locks+0x9e/0xe0 [ 2908.885737] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2908.886848] ? cpumask_next+0x1f/0x30 [ 2908.887743] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2908.888818] ? pcpu_alloc+0x12a/0x1240 [ 2908.889698] kernfs_new_node+0x18d/0x250 [ 2908.890640] kernfs_create_dir_ns+0x49/0x160 [ 2908.891666] cgroup_mkdir+0x315/0xf50 [ 2908.892540] ? cgroup_destroy_locked+0x710/0x710 [ 2908.893658] kernfs_iop_mkdir+0x14d/0x1e0 [ 2908.894601] vfs_mkdir+0x493/0x750 [ 2908.895430] do_mkdirat+0x150/0x2b0 [ 2908.896257] ? user_path_create+0xf0/0xf0 [ 2908.897219] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2908.898435] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2908.899630] do_syscall_64+0x33/0x40 [ 2908.900468] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2908.901676] RIP: 0033:0x7f371d026b19 [ 2908.902508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2908.906637] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2908.908363] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 2908.910018] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2908.911603] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2908.913223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2908.914878] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 18:52:55 executing program 7: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x80286722, &(0x7f00000000c0)={&(0x7f00000001c0)=""/170, 0xaa, 0x4, 0x1f}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c0000000000020000000000af0180000000000000000000000000001855fdb0589074e7a532d284de275c260160c7449cce1475b31b62e42f127185fd936850bbbdffd49799bddfc75263ffa9fc37387af06d12a0238858c2bc5185cc50376f54774936"], 0x1c}}, 0x0) mkdirat(r1, &(0x7f0000000080)='./file1\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f00000002c0)='./file0\x00', 0x3f, 0x4, &(0x7f0000001580)=[{&(0x7f0000000300)="66d1ab3e10836716fe2e59c7db65af73f823424799f2c6f66faca7c66b39c101897199bcfa0153f24305121c61c726d03c56ea1bc0928a", 0x37, 0x100000000}, {&(0x7f00000003c0)="da407f4d0f839b33c7505b316f15ae20f34f36cf4b58a931044e388106c28c6270654c4c2dde9a81eedafc5150532a97321e6fbb32b1c6ef82cb527568d65bac3bfd", 0x42, 0x2000000000000}, {&(0x7f00000004c0)="8c1970cff8be580ce654f9a6eedc9179901bd98737b05834e39f1d98989e2951a0d9c43edd8e42d409829a78d9f4da07318c747aa8bd0e0973bb9c1d83f0563fee0ff130577574bc858aa60cbf2f0d9310ff4ce350df699ca43baa393ec48be2828307ea47bb7bacdcb901fd1741702adf4a392bfaadbbd11093cdeb02672ded4fea84d93280dc605a2c89a815c961b9a698b31a7ae12838e1a7ccefcf924162afdf6470336b92a03dcf2eac00ab3bbff8f8a08d4f6d55c60c42d3788982a9aa0aa20eec514cd77044c0f5d6e2bcc40daea073475c95bad7f515ef3f45d997c14f9cdd8c6776f27efb221aa57f7c25d248d15b219f1601163669985aaa1cc0657d4a4eefe7d9899e4fd247e2395b9a67442dfe6d6afe2e6ac99e649ae1ea7fb9233419b59997905834041829064fa3290d98a50aa3899b64f42d0d0ba6924c0ca6b55c562fa9575778d87694b275cd7683b4ef8c577c98aabe34522d846fb2ca807dd6a0acf8881c0d97bbd70157588e35e6c21f3f456bd33c50a0a730e9c54f513c713a8cc2f257a025088106644c5d00c170826c9bd1971d5a002142d3a9290c0a975c16b119a3294fb96d1258eb031e016531c06adbe6188705ac81ceb3be2565b22e32df7542d2721093aeacc1909b1615465323f71681c7270cd411168be8144fe73f80d70171e8dbe6aff1815d2c885edf15d810af78fd760ce9848e413410f72b5df5011dd7c8f3e6762357e930727190ca2858d7aed36e7baa8ab6ccd75adc1e60b934feb52247969f2f2200c0e5c17b25ffe3dd86139f9a17e04cf57a61c33c3cc1f85796a6f4fd8e71e5c1757c1009922cac64e77223a687a1355a90f483e74baf887ffeb7da410a16e842e65a040e50052d6cbc2a3054762ba9f968fa249fae821a7555d6c97a9b0af0f6dbc6b61af79bcb65123d428c715da33a6df2f2c7f7e1585622c467c0504f67b92858ede83b804ebddfd389f7319e3a6e8726ecadec3c17b7a01a841deef1f893095f91addcedb185d6a05d12fadc9a107b20ef48c72f8352430a703cd535cbbc239c2fcac868b9b9a93dd8ab79f054313d91f9914aa7794d7fa7aa77b72444863ad49d4799b2bc0e5fab417d681fce618c3e5fc2dda2989d97a4a951376e97656d4ba139b41b912a13a5628c6f36f1729d9e7128f1187ddfffa0b81e163cb395c7d68262533ed82ec02f009e1a4fd7630cc36cf7e21ccbfc372f555d0122087a888e61ede57919521d6352bc2b89d00b77ff0f9ea5e15d6171d55337a41955b7910d04c7284ae60ea263e26f0ce81796ab371de6c34ef2443e89d1f5013fd326ee5c7e49438f8b168b75f1eb2f031ae736fff99ae0c49d5b559aab8b4f892c6f5449462cf2580f530840c1b506b3414acf7a991d6fcf4451abde21647647399bd1eca25be498c7a0ad432bb20f7e5ed7c6bbf8457ce20ce20962aaea0364f47332a3c2bafc268d91d485542b456be36aecec03cf270ff58f816f3eef2a29b06977a185b3e5d5b81964beb07e624df97f7abd32e1b98c1d0212ee8c117ef0941efbfb7d860101c7f6dc76aca1a3a57ee8a5bf02df58545caff7b41576c2713807d57d5436203bf37acfa5aaffe7b8efe0d464adc2a71a77cf7465f9f1ec4e8990f0397a359d89bfe374106f6a18f00fd0185449418921a17cb5966170e1f2aa8c13bc40af1370b3dab6622f59963799631a7244c9f8cc0e8ace66b6fb02174500423b0d4aa00d30598586ef21b6f982946a78e9f4ae0dcd652ad2bb5dbff7a91c10869490b83b35578eed6b93c11981a78dc3b3993d3cefea6414037c027638872fb4a334c6caa0ebb6925adc893dd37c991f50aff613de2dab59a2421d3dffecc97d9ae0bdd895cb2fdf8239ccc43a2c8967ea4ce26827fb24d5fb85b42e091d1ca988fb4a7346c640ea990502d221d1aff48dc72e7a4f469d86ed64c6e72bb9bc43069b921562bc5a38317e9690d2c446354032d8b8d88b1e79f7e16e7e1e5d2b759d61dd38448b75d6f16927ddc0272e62626c4d1a68bf842d2e86a7cc85d6a69ab79c80625062acb5357bbfb955b7507fb423cbdf6cea090bbf317c9fb122f27c602a43121e2cee2022e284d223bd0052d9b22bfd6fa12fd9bd933b0bb014a16e40123e951c6fc90d42c746d78e55542d6d58dfab7f73e060e26dd2954070030b0cf729c8537a5f5500337f1c5e6e86294f84f86325f686611daa65b6ad27c6df4b43070667e66e6d0ea9f65e88cf67629b09af012940a95143f880055f0b182cc3cee5aa09d53f50870b041305d0d814ef04dd56554f29ebd59d6af745547572af89eebb0b23ccf2b232cfaa5218a6bf132dab87a4e42c98285ba846fa4a66cce8250791d23d49cef7592f68fe991a5d5757eefb3b577a01e86f59bbfbbc23abe9636d1510453530ced22b26b42b95a87a0ff1dc114717c12cf7edf8c12b35a5b6d45ebf593c8fb30ba7ea6b7f85869f3e0744bbe19291e8120e300e6214f67b87763ceae1e3b29f43d5844adbc869ebafca34df12d1062a7e24baf063a11194dd80c8928636d510ba79a46cf95be247d504c3375321e01650024bc51da1aa9373ef9229bdab7c7683d3a3e84a17a0b0d4fa51d46b92b92acbcea09f7a9955fcf35445e459b82d15e4041101aceccecbc5000ad4946de943cc8a823d9a35847c48b6cf7e420ce284c75fda3d74df73c621a59dcce9b77d6e35cf70cf971b96409fd0054052d4c3aed2f420e27283b15018cb8e2f8cf7124554ac8838851b43a359a1ca35c27b421406ea427b8dabb1b07317debd5caecc239495ba57df706e9c440c2554986b804940c388c0bd076075d78f8c374a77b687957a2609c8aafb24001c4089465669825139ebf135917659e7d591a5a96511e125eba10a21826320882f2c8442be873ca63edd0fa7b421c5b7a95f357c8f4295413618558eebd742711916e164414202f8d5d46e831ef383469eed01cbec84390abedf53fcec85e0c3128f6d4434a0fbf111a52ef5cec6c254d3ffc45739181082b7995271b0f8dac3eec85d4ef4c2ea764ca7e1ac205ed3004119f574c96eff2e2d1587643abfbf0929ac04b258258c172b2df89efe7d31494fd12f80fc2506a652fa80ee8ab0741ffd759704cb479a5059bf8e085e2f33a737f82084ec6718b170e188d0021d603a61d3eae128a07e55643f0c70853081caef93c938c404a9a4e90a820a23d3499bde205f749446ade0c4e225a2e308527bef177ce1c15751f2abf5e7ad583d5fbc55eaa1eadf96e0b351115535b72bde30790b3ecc5980b43493379e3adc59d7991668b8710c434e3c2ca197da148a154ab6d4f874f529541129e337827a997bfa8289cee57d8bc80f8e09bb1c65d834abf7f2a13e4a5f1e1fac0209d00763a4431d6585fb2c4ad289262392ad54f8cedf86261b7f2f0a13ecc111c48256b4d2c3926ad6a0f03ff1d3d215609e05eb93b95afd17976c82f05bb8cba891f3fa71858f332ae7ad110a0bb853a76dbc5675752ad20905ed0e1424d29659c48dda78e977b53a2c66702e778bae566743c83f06d72dbca15e96d64dc633d62706c5d051d02fe59dfb72d69ec5cc7d06bc74ec142a0ead5687d99a5969fd6740e68761f34524daf823d55e3c352783925e09b0779a12474fb6022b756da9f0c6a35470ea55cda4a94da2c177bc53f4a59b523067264db2302893d9c863356a42d5388a328a401b4edd787b8dfd1a19c8f9d380508b273334f65eb1b3b0982b3e80866063d77b345fc587055dfcbba9bdf1cd1b4da252e2153dc28c08a27bb17d84976ae7f5688a5dc13203e8c13094e375dafb70b09435c3252a4ab0b325124c24e5aea548c8424c3768740101e7c07758b64f4485548b6400be93c1a40ac557669719643d8821fdc7d78560cbb3427a2361daba026c2a049a669f5c8c1312902603d268b2dbe015c6ebae017bbfd2d5a5370f1f23ffb0e2c30219289845ba07b63094ea89c112799d212af419f706c670192f99eb65a9c65f3b86cf1dbdf785b0bf43124a84f36ff0355890b57a1976f7251e5f7e1e0668aef647aa813f5e1879e5ed0f8885c24776d5749daa89d84e4a28b47a490721dca62f6a2683e4c872055990d53b2d1212cbd61103c506cde3695eb6da6f16488ee079bb99949bf68616c96631b55bc4ef588bfeb8aa3956c6079ae120bceedc808615432cccf8b20f7cf0d57dfa7f7ab34fed3ad8b96e4278255891a698ea068dac568720030ab8c8dbfcf96caa0b4fb8afd248b9e537b71a503477a08b59075007dbc447729036992ff5256d25d90c1b448c3a7171ecb1177cb9bc2d66ca724d97b64667cc2451c5d017bd9e534de75df3cd0dd17c40b2775e2ca5bebc93c60088b246fd8b72bb93a0e902a64e269210368eb3127d73243b4ef0c51a4006265206c6821ec38ba11f3bc876ee8f64bc01db85940c77fe451a8c65f9171d35dc4a21112fde9a12c9bed5ac1bf99f24ff45b1056ba04d0677277bb6d02ae8827dc914f64c7facb6cd7137d9480ca713bf9530a1f177ec894092d847308d7f688bec83315362ed157c2cff92cd6c61d73dbaf801a34147e6c1ace2fd4160a52db4711101a1eb70e4acc2fe85bc6922cd4acc14b2b384dcadc7a995f64a9cbf8d208d7a3bdbea3597b53cb1ba1c6d0816b7c9820bc485770773ab732a66d5025a9d31458e3ced968439d6fd2b5f04f5a917aab50cb8474f8d9ca97c1f5c42f2deb2e71c868fb2dc4298180f7891e346dd908ed70d1211b1cdeddff57ba30412792b2d76d5ea3f2590044b3e215877f6201ced3eb4c7fedd966047574be899ee3f467f04f5ae2c523206fc4b205083d930ae7a6b4b0548d5a0d839d70445075f48ea5e8138d4895d448c28e6bec91aafdcf16dfe6c8601f9c52cc5965639c62bad7c6e8b784c72b64ba1ba77c657b81342af02c2f7cffeebc663c754b30d177382b3e3e9632827250f58c70572d37d8eb83f7f48230467f23ec81620b55f2c7f6a5b2a46cf4b481fd334de73fc28fff7847c791979f386248b5ebdd792dbd85be5963ddec637917d2a16ef9c48a860557c0ded1f8067f55cd9fc5e2e8fd2f7effc36c3003d2dbc52075577a6768c064d429661ba644075ea935de84d86181d3d4d2e986a9c5585a2e7671cd41ae8c8de1f946fb9b0465c2cd7a88105fa4fbf42696db4a4841c94232e5b315e14e93ce7d59d394d11c72b6d05aa6428f0de0c17a030372cb24890bb91347923d9aa942df15820ec344a51fd8180db18abd80921d62ff833818b4a8d9be5688e0d44c92be7af58f32085c370fc652d2071de75eeef8cd113f2d56a10b58439736fadac3b72c865e95503762d9d36d37ed59dbbff0b81547594a2b11dbfb0ffef69c207403f008ccb374738d160650d26a489a7688370ffab6ddbe19ba0b75d50a4ff3cb0989f8f3f82077e773fd6f9eddea94e8d09ed1feec16bd7da099bfbe4ebf8f4c439c84a75b4c209691ab0ea6ef0124b936ecf119d954e750c9fd00ea26af32133f416b0a32f21cc8c1593da463af0ea237b51dafef59edde065ada6ac64ff4568591323c05ccc6b22bfd8d850ba57db1a9abcb9c0ddc4a36e051eb9ddbad425eaa72f08443fc4f95ea8702af4c6debd0d581ecff6d77470e102cdbefd7123ce2a3dc36dacfb8068e0eee33cb376a732097167b44ea24dd7f577f9b04e70f5b8a59d6af81c193bab0be8ef5b3db9760cf525d0499dbdde60bbbac61c9147ef4d97f17880c0fc969c7649854655", 0x1000}, {&(0x7f00000014c0)="0418a9fe83721bdcd37d5d9dea188533f77a6bc7a7ff670b115dbb72be647c89f268a92d8ecf06db6bc05b3706cc893542f3285d16a31fbcb04417775f20630f1ac1fce1dc9df824e796f009cf10e7e88a901b72006b5ca7a17d434e06ca32f577dbc09ff7a3053022ef9a45673069705a65ebfab6dcc4dc357e5cee419f1d1360ed181e7278367f4eddc1", 0x8b, 0x1}], 0x20000, &(0x7f0000001600)={[{@noinit_itable}, {@errors_remount}, {@min_batch_time={'min_batch_time', 0x3d, 0x5}}, {@data_ordered}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x800000}}, {@mblk_io_submit}, {@dax}], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/sys/net/ipv4/tcp_rmem\x00'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x100000000}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@measure}, {@uid_gt={'uid>', 0xee00}}]}) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:52:55 executing program 6: ioctl$SNDRV_TIMER_IOCTL_STATUS64(0xffffffffffffffff, 0x80605414, &(0x7f00000002c0)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xa0000, 0x15a) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0xd4, 0x20, 0xc21, 0x0, 0x25dfdbfd, {0x4}, [@generic="420003009035bf280a07b25e0b236db64be184ab768c1b34a4948690e56ca02faa96ba5041724b2b305ec90387d364246337d5c3f33e66a8fe5140673399762c2f398f1af7911198faf80969706bdc169b7aa476f1355170fea2f8dae54342a02740917f506d4ab6e2f4020b6047d4d97c85755def5909f44390e44f5ee19f63ab1e0bce3e4ff8b3b1ee2d842bf41dc781c7748e3095ea5e8a04b9cf3acac02daab934952e64bca93299e9d36b32208e0fbca8f3f9e2968e02aec70fbbb6"]}, 0xd4}}, 0x0) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x1, 0x110) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) sendfile(r1, r0, &(0x7f0000000100)=0x2, 0x52fa) 18:52:55 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x200000000000000, 0x0) 18:52:55 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') 18:52:55 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chmod(&(0x7f0000000280)='mnt/encrypted_dir/file1\x00', 0xcd) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) openat(r0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', 0x60040, 0x10) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB, @ANYRESHEX=0x0, @ANYBLOB="2c64656275673d30783030303030303065432c64666c746769643d000000000000000e0fef1f73d10579d8d0a8208c4e11b7dd3190b9fbd5675641eb5402bf055969a60a09022efab6", @ANYRESHEX=r4, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d1fb27-7ab5-2c03-5304-afcb01cf,\x00']) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:52:55 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) getdents64(r1, &(0x7f0000000200)=""/92, 0x5c) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x49) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) chroot(&(0x7f0000000100)='./file0\x00') rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000140)) 18:52:55 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r4}, 0x14) [ 2909.104385] loop7: detected capacity change from 0 to 135266304 [ 2909.150396] tmpfs: Unknown parameter '' 18:53:11 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',tXdfltuid=', @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=r3, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d1fb27-7ab5-2c03-5304-afcb01cf,\x00']) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:53:11 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0xffffffffff600000, 0x0) 18:53:11 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) r4 = getuid() lstat(&(0x7f0000000300)='mnt/encrypted_dir\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000040)='mnt/encrypted_dir/file0\x00', r4, r5) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r6}, 0x14) 18:53:11 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') 18:53:11 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x30, r1, 0x200, 0x70bd2f, 0x80, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x9}]}, 0x30}}, 0x4) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xac, 0x0, 0x4, 0x70bd2a, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_FRAME_MATCH={0x90, 0x5b, "7be051404f9b5e1416a718855180b5039c74c75e5e58fb7905518a6fa2489a0a316c8193618f183d5f346d704b279753944e9de0897d60076267ee525b922fd680a1e130ea566648ae4fe3e97f84870d6e227eed7ae38eae5a9a5c807cd2b318c1bd5c35866a565f7faf8b7b8fa3d98de93c8c774f20dcce9bff68b8c39e091fca787f749a92510c3538da23"}]}, 0xac}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:53:11 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x5c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') 18:53:11 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x20) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000016c0)={0x0, 0x0}, &(0x7f0000001700)=0xc) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file1\x00', 0x4, 0x8, &(0x7f0000001600)=[{&(0x7f0000000480)="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", 0x1000, 0x3}, {&(0x7f00000001c0)="97e7731d22fe6f3c7f36344234a89f28485f177ddc19720230870443dd50bfb51e858aea308e59afefe7fe7f0e0452a43efe4c1776fec7b06a5e227afe85f25f9a4ce12026664dd687f25bddf7aaa2893f9e9817747859436a3b38ec317cc3a179be1cc7c20bf716c0958a8848af0104199e34db675096a5a0ed3e015219ef47e362776fe5f61f2243a0b638b4c55c5c1deeb29870bf35c932c426f016f53ec2094e3c65abc9eb4efeecf02f80072367f9763d228684c2345b3e46b56087d968d27556a0", 0xc4, 0x100000000}, {&(0x7f0000000100), 0x0, 0x3}, {&(0x7f00000002c0)="eb6c3249c51cd589158d8dc93f91ff394eb5814b507538febd5a219fcb3f46abdcfb1eac66a80529ddcfae70", 0x2c, 0x1}, {&(0x7f0000000300)="abfb0eb20c0ba86374c49aee23894a4cc2a0e3cd940d761f7bc866508740ee60807089355c0b5b4675d82086785f719bc3d9a273354d0648d17f36fb871dc019eebacc3ee4142e9798487a32de7f64d90ecd4afe8ff06dc20af4227d5d4cfc4db9f107aba522f8ab88f6375ca68321692e2452e284ceef170885aa4f1fce48534f8017684b276d13ab59808680cedc4ed5153e8c935f915e8bb47d923b087950330d1f004c3950b549893d84e2f52b4faa76cb1c523516ea6e03a5340d439e6785d354bd47cbcc66254ef5", 0xcb, 0x3}, {&(0x7f0000001480)="6d9515670473f1168dc81644d6353c6d31518628b99720a3465d27f4c9bf8c229bc6ab937f13cfa329c2cd5295a2262927b6d0ce260bfb166ed2768144a4c4567e452be68ea9b294a996ee3a24a7a5a964eaf83c046ce87feb1cbf9ac2efa950bc3ea836574db790d62315641d855ddfb6955ffda5debf3df9a7ffb3e7e54381658e59fd03f32e80bc9754ddeea15945018c333790950a690b9f5a77beff7d41f54b88f6e1aeca0e80228c35ddd1591523d1f08921945607d2", 0xb9, 0x2}, {&(0x7f0000001540)="a29166d11acdadf73aa0ade61bb3d5c7711b833d021a9d2a4d9506b362bdbb6f450b31c8fcf22e07a50546eeed42104000546502361b030d38809b5dda43077311560f60ba134a88c5645aca59fb02ab6fa649dac46190e0c82538d579a067019321687c667ca06edfab08f0e017be7912ca46b2b7e60d45e04b495115c9fd6470dc1757a78edd706d0e8edbf7c99558b10cd14f987db214e8d6825b6c6d6cc17eeeff85c9ceac797e256b741b0d", 0xae, 0x5}, {&(0x7f0000000400), 0x0, 0x9}], 0x10, &(0x7f0000001740)=ANY=[@ANYBLOB="687567653d616c776179731c6e725f690600642c687567653d616c776179732c706d726d69745f646972656374696f2c657569643e0000000000", @ANYRESDEC=r1, @ANYBLOB=',seclabel,audit,fscontext=root,audit,obj_user={-,\x00']) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:53:11 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 15) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) [ 2924.975846] FAULT_INJECTION: forcing a failure. [ 2924.975846] name failslab, interval 1, probability 0, space 0, times 0 [ 2924.978196] CPU: 0 PID: 12069 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 2924.979509] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2924.981112] Call Trace: [ 2924.981620] dump_stack+0x107/0x167 [ 2924.982318] should_fail.cold+0x5/0xa [ 2924.983050] ? create_object.isra.0+0x3a/0xa20 [ 2924.983937] should_failslab+0x5/0x20 [ 2924.984678] kmem_cache_alloc+0x5b/0x310 [ 2924.985461] create_object.isra.0+0x3a/0xa20 [ 2924.986290] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2924.987259] __kmalloc_track_caller+0x177/0x370 [ 2924.988157] ? kstrdup_const+0x53/0x80 [ 2924.988907] ? find_held_lock+0x2c/0x110 [ 2924.989692] kstrdup+0x36/0x70 [ 2924.990310] kstrdup_const+0x53/0x80 [ 2924.991033] __kernfs_new_node+0x9d/0x860 [ 2924.991816] ? mark_held_locks+0x9e/0xe0 [ 2924.992589] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2924.993482] ? cpumask_next+0x1f/0x30 [ 2924.994204] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2924.995081] ? pcpu_alloc+0x12a/0x1240 [ 2924.995837] kernfs_new_node+0x18d/0x250 [ 2924.996609] kernfs_create_dir_ns+0x49/0x160 [ 2924.997443] cgroup_mkdir+0x315/0xf50 [ 2924.998170] ? cgroup_destroy_locked+0x710/0x710 [ 2924.999062] kernfs_iop_mkdir+0x14d/0x1e0 [ 2924.999858] vfs_mkdir+0x493/0x750 [ 2925.000529] do_mkdirat+0x150/0x2b0 [ 2925.001216] ? user_path_create+0xf0/0xf0 [ 2925.002002] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2925.002984] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2925.003983] do_syscall_64+0x33/0x40 [ 2925.004690] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2925.005651] RIP: 0033:0x7f371d026b19 [ 2925.006357] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2925.009844] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2925.011283] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 2925.012639] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2925.013971] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2925.015299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2925.016622] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 [ 2925.028913] loop7: detected capacity change from 0 to 135266304 [ 2925.031805] tmpfs: Bad value for 'huge' [ 2925.047377] tmpfs: Unknown parameter '' 18:53:11 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') 18:53:11 executing program 6: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000000c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000002c0)={"3ca059db52a4c6b6df8c2b41f44fa270", 0x0, r0, {0x41e, 0x800}, {0x7, 0xffffe98f}, 0x9, [0x9, 0x9, 0x4, 0x6776, 0xfc, 0xfffffffffffff800, 0x100, 0x2, 0x1fd, 0x100, 0x3, 0xffffffff, 0x7ff, 0x9, 0x0, 0xdbc]}) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4000, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000440)={0x4, 0x4, 0x1}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)=ANY=[@ANYBLOB="a31d00002000210c0000000000000000020000000000af0180000000"], 0x1c}}, 0x0) renameat2(r2, &(0x7f00000003c0)='./file0\x00', r1, &(0x7f0000000400)='./file0\x00', 0x2) socket$nl_generic(0x10, 0x3, 0x10) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:53:11 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') 18:53:11 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f00000000c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:53:11 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x2) 18:53:11 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x100, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000200023000000000200001b7f0b6f4f0fd82f07"], 0x1c}}, 0x0) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f00000000c0)='./file0\x00', r2, 0xffffffffffffffff, 0x400) stat(&(0x7f0000000040)='./file2\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) recvfrom$unix(r4, &(0x7f0000000300)=""/149, 0x95, 0x20, &(0x7f00000003c0)=@file={0x0, './file2\x00'}, 0x6e) setresuid(0xffffffffffffffff, r3, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:53:11 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) faccessat2(0xffffffffffffffff, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', 0x20, 0x200) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r4}, 0x14) 18:53:11 executing program 1: mkdirat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') 18:53:25 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:53:25 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') mount$9p_rdma(&(0x7f0000000740), &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x50028, &(0x7f0000000800)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@sq}, {@common=@fscache}], [{@obj_user={'obj_user', 0x3d, 'lo\x00'}}, {@dont_measure}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="f48175737465642e006595cac74a5751a29d8f84837504a50a56d3e2c98bb799a862cdc38601314669f9b3d6f97a3d7d093b032fbfb49405c783a16e214ccad655"], &(0x7f0000000400)=""/19, 0x13) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), r0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000700)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80840}, 0xc, &(0x7f0000000600)={&(0x7f0000000340)={0x20, r6, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4810}, 0x48800) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r5}, 0x14) 18:53:25 executing program 1: mkdirat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') 18:53:25 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 16) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:53:25 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) faccessat2(0xffffffffffffffff, &(0x7f0000000280)='mnt/encrypted_dir\x00', 0xea, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./mnt\x00', 0x101000, 0x30) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, 0x0, 0x200, 0x70bd2d, 0x80, {{}, {@val={0x8, 0x3, r1}, @void}}}, 0x1c}}, 0x4) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="00000000000200", @ANYRESHEX=r0, @ANYBLOB="2c64666c747569a039ca724e1eb83d7bcd74d97b136b351b0f104d0b3e4d0ed1b43d29442c25ae83f07f49ffeb0e133ce6e310586da4ecfd5703225c3aa7265e7383ed618b2f8fde057d60170c0ce6b0a112bc4c358b24cbb5ea9c1815c57c2ab98cb6c7ceb29c939ea7a28bf992b8643b2f0d07f0a13bdadececc25fd5877bab9b7dc07a4ab40520a539aaa9ff6f40c268ee5a6adec5d4557f481ede61f6ed3ea8d346f70fd", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=r4, @ANYBLOB="2c736d61636b6673726b6f743d002c6d6561737505652c6673757569643d37356431666232372d376162359d3263f8c88e123330342d61666362303163662c00"]) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:53:25 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:53:25 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x8) 18:53:25 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) mount$9p_virtio(&(0x7f0000000040), &(0x7f0000000100)='./file1\x00', &(0x7f0000000180), 0x100090, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=virtio,cachetag=proc\x00,version=9p2000.u,cachetag=,]^(,mmap,access=any,msize=0x0000000000000000,debug=0x0000000000000007,uid=', @ANYRESDEC=r1, @ANYBLOB=',func=KEXEC_KERNEL_CHECK,appraise_type=imasig,euid=', @ANYRESDEC=0xee01, @ANYBLOB="2c736d61636b66736861743f70726f63002c0098f0ec3f61600a3a4536f0768f85b7bdbe175bb739d45f4d9e88d418cab7bb7e706f2e91c2c4f7cb971ce209e2d96ef2b9768239b766b26a3f1b6129e2ebd1667f5047a196d2a85e346911d5bf09b2a17764a9cc62fe85b0e4fa35ac3880218fa1abe258e6961880eb94"]) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000061a80)={{0x0, 0x1, 0x8, 0x34, 0x10000, 0x0, 0x5, 0x0, 0x4, 0x7fff, 0x7ff, 0x8, 0x8, 0x3e, 0x4}}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000062a80)={0x0, 0x0, "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", "fed6039371a301afcf48c5d45938d08ac52ffb0b750e848bc513140612a996e19d9dcb3e6ce641b9b8a317fb67d7870a59e03a4c648adb998e073736ae06f88cfc96dbb814141ec09ee7d06eeb66d231ba61e2d7960cd9b10f74f319dadf4b70f7e254dfa3764a5b1113e85f6220a6663ba40800b5275d04ed8f9048bb30b39fec867fc9f242078acf0c3fa4f28154b9911400d4dc829d41e019a354a57144178f78cc11432c7f5f788ff78cac0b175308270ed198d9cb97030d43f4d3a5cb79157cc17e148f9d760308fa640bc4cc4f5cdf91b2c39ece2aeaa6f8809c0070a647a71484e37273a0e10a32afded1999fbbdfd3192af0847461b64d7a3130192b3f506782b7ee7978e9a55ec3086fe9be6104663171fee0fbbe9a5989c97106e9c173b6c84ec5ead13f47cc4600d07e7845013a0739e06c21b96a34c4d873eca8de0eb07307970ed34630310c06add25bd6f4a64ed95fd798a4a90c4fb8501b445ff58f5d2fb1f702bf21d2418cbb7e3e31dc613b242c0a233b3dc2b4522dbab332ca0ac66c263562304574f7ea642017c5139ec0488eb1b818b151efdba66c1df4286ed3c3052a61096927f0a8fbc970d871f9f45269c92801550e4398f5ffb8f6dd8a0d00b99a44a4645b73c4c7e5d81f7a4c3ba4dbb5c40fd2fb56095a4af180709ccce097fa98ead05b9f3ba72641c18f78b62e2e9ccb4c0a78d553b5be11e026a3d0adeb660b60f5155bcb33739ea84d8c04f5420daa9626fc011e994e13fb409018d5cb2800ee3c96ac8d82250588c4bcebf60c43980710e92140413eecd25da9487c8fe2bf337e71968b177cd901606abdbce8ed99c7e5d760dab569d131da8717f2da0fa6e1697d668788dbe1745a00056cb43cbd15d328e5ea229c1bdcfc1acd2266e5c2c75338298cd93813946c166f5147c0c46a677c23fde2f01daea1ccb2d4674e4fa0e8203d56add7277ed60004df9db639d5fd8201cff46cc1522c519d6a9cc5db3be9b470643f5c3a5dffde3f345dbe87d434ac17a37867d15e9f433f7dac6685d04e77eed85d13db058144794e7ed8dbb28d24001080bfb6b98da0bce2ad8e145a439624e06b08c738eff83ba978836918a3e9e80097ac881a6acca09493b811b2918a07c6eae8aaf38cf254b7a3f512a6e6bd32adfe296cac9d499f5e69ad24a339bfc7f2dae1facca676d3390103447681f9a2c6a542bb2a68e221ab3660d73f26a8e0cfc474cad5980bf915d2d6cd403bf346d88d719c552a234fca57857c05e11a28b5689be21c160453ad8e879e2cfb17119d7881172244e01e07601a07f49b7483d1d03ec71154f0a612abfff3f8ac37d88e71f2371c0e342fb6d79f765ba83e0fbd4d339d9db36875c975c00019fe9e079e1ef28e0568c64a666ac0eecd482b977bc3902de5fd5f8ccd2f657e36223d5295447b08047455087e79dfe244d97ecdfcd9f09728b382f226acd68f6a68872f19df23ffa4c3fdf8f444bc27cd7416aeb0e56fcc0367a5707c4957c8e3aee8936210dc691a9058d3ebb23ce0e20185f8d9d43febfc255377cefb34fa2e1b0e137cb0ecc2216f7623bfa00c64398bdcc4d53a43eb09b66dd864b9e0f7fd3b27c7791ed86f0b66b1e0c43dd2c40ad6e881c9fd92fa611116195c0def8c8cee025a6af4556d40c55f81e2904ebb1d9e91a328195283778c019c06f4f9e2ecccfc4e383aa16fa1996ce3812152e15d7613bf60695266911d13a0e3f295b44a848d29325a690f9ab8808adbae37875351272ae0d73286fb1cd71891262e2a554a6c297a6ce13eceb2af34f31b7e0567566093006c6bfadf047835a535b3b4dfc7db4dc2699a42c47950ed8feb8812791ed9eb6e761a81ff83023256b3cc905c7a8bba2617b7ce6c47a6231de2cf28165a9dc0f176ece2ea5f0aa751c38dee6e07029678988af9799ce236255d0f8f3ec540ef7e857724b21aab209c430a25082274dd5b82c35e55d657026b1dca93888742eeb261c9cbfcfdba6884ba5079abc7099680f3693f97aab175830a3292c64cb6f5344cef2114b6999982e6d4c43c164058486bd57ceb59aeadd367cb380895accb13ac057707ad9281b657ee921c50bdeb4cd206a790b46dddf7686f9a9664ac4392cd3d85269f0b2e19634d64836b63c4a262ee54cbdb3ade78ac2e23c6cacd3df9b833f292bf58c1dff30e77b29e2eee05f2a3880813342e0c45ab0e5d1ed6989bf50638f62def196250eca1101725780961041fe9c6ce699c17a19ad98711077eb6449ccbccd473528360054a54ad32046c7ef0564067882131a5d2c8ecd4ff706930b2adfb8f08e3fbed79f8c5f45acea2851ce8b012a065596ad89a1fd024c3cb4fc7c5fa46d44cc2e5ad42701ba4fe8ecae35c55d1a61bc19b327a30c0e26abfde6665eb228070b80460aed56033a6210f11918ada58398f4b0e5019db16938c56df3359311266b35fc874305d25eaeb1b10ddb98d57bf881cf86905d286e8dfcc68b9a7cecaebe7f5fc8999bf1737e83b7d4b8620eebe671e6a02150e8cdef5e565e0cc7841d2728e1aefc21905789b27d48cffa2d9e332d46bedc55e8f58585835a61bb31821a2faf693ea4809f30405a1f077b8cac89ad83ff33842064f3be8ff3bc1de6090cb42f7e446b18c735ff4134f7b00c88fd088c75babe7ae9e70665df5cf750dbdd4e68599a33997680babf52bfde81ff46b0d6698d2b163d0e82484a0eae2695331eac65225d9f73b7b9abb0f6c1d64b61bebfb08df300c1aeb70b54366fd2369a8b009397dc7387bf4b95803472248dd80474226eec4deb81e46c22b3cab779c44b45330c5f7379856eaabb58a5b9c2f3147e750b61e0f87b3b7180e982112120f02c7c0729b5279521f64136a1c51d41d79bc48408ff46427094f34e41fa3d5932c5a81436d57f7b371d1be8e794ba99eab96b09c8e2cb27d122f811f805831d1c4f1bcaab1ab615f00e9e913f8ab81903d905a402ddad630892b40fca6d12e15fe5bab57fce5693d8fb3da769f570cbeee08c1b284aa44a65287d3a73de0bb9e483b668a9aeca142f86e7029fe825269e343a3703bd58d6f43a2221b174b6fe00d1e7ebe4abbc5d4080d4a6f547e80f4cbc44e642d57ad80186687e3df70e71720364fb511357899dbc7f5aaef1e540f7a78f60e7d37a1aca7665392500544cafa40081a4993813e3b2e723edc10d0061c4f7201e9ba03e71db0a6fc5fa75f14df8a586b5b1d9d5197146ddf3e3cd4ad427df88055051258b8854f35ea8d09d87e2892a873351573399bd90e3d593220a17d745d5901e34e92a42bf0a0e0ff08671fc70dc27817ce8eefe80f7740e14eca2ef68e31998b2ec7b991b8dde492768cc62a195765c211add4b160eb64394c800170b9e3dbda4fa3707f52b872c99bd8decadab8fc456c7bdf86758020128f0a3501c519f344f9779e8924411f244c5f762deb792ed99210341adae6dfe547200156c0c59af6add444cf29cfe449c3ecb00afff0a1b7a29467e187ab6f4070df7ce13763b0a6dff6d1966ab8acf23a94141c30a6e5424da1d3643cb2447152319212b97e1a7ca5c2db1854a82f41bacd6e744cf825359da22c1cc46015c34a10e76a897876080e07da7a6a03a8e584b77cfabfb9d1faccb0bbcc717ec80d511ba41757872c535b3564d78486d99de774d2426b95f257cdfa482f878dd01146f0b7d6e51c492bcfe69d880a218950e3158ba191e1aaecaa92da24ad0ab2010c33d507b90dbb8dcc60e2b9d103c0f865a70245de11db8e4b2061fef99d61117432897b58076a7a579cfcfe07ceb2f1d780c6e0b2707b5245e361b282d0c2b061ddbab65bc64f5f63be5130c0ac14f4e3a3cb5853a62ed78660afbb6e80dca238cbad628eaa35470929670e1e67660d89ab46067b2404f29f4d67fb94ec0a16d57d38845805335586f0c3ee7b8722257e70af515c7443ef85b30d4a6dd229240d7e1cd3a2a4a6a64e042a10fb34482de3805f9d7cbef010e3d5fc85698857b860fdad8a77f65b7da233044e1d76c292089123bf60ea086a8f89a7a3b39556e0b936e7d42c2698d9757da1448e2eede4f0d148233202ba9ac2e3547cc747f63792600e0bf696f303a52fe1100f3b138a8034c67e7aee232fc6673af1f62a36e199e31b5f9fdff42a21f04c529fd99d697894f9963dd11e380947850b7648af00bc057755114cfba919fe7419906763393d2807d40ec189600d3770b21c25e56074e513853c2e807d7af7e00273e14a777b1696881a8befa1c3e8b0dc8f3e7af617bead0b206e69fe693ed78c3db41056754cab23fd87dec565ba0a9ed45a6c694580c67016f76bf0c3c982361a511cec10bd891cc4435b483ab5e6b2bb6b75b80c606297002c65cf07b56c673d167b924d7419dd315d39a91f7597400161e814c39ba3dc3d7a67ae2d6aa2fb4be3d611ae28ab33cc515b367ca29a66a4a4f137f4d73bd29ba90bc9a19d5dbe806f2d7aee0e5bcdc5c891bfb361fc538ed74965a6244c1d06a7427e642b3fbf77d0c81d556b2586f49137c2246920d3df6feae459306adfb286fdee1fa6d08f2d0098931647a70836bc39a63cf42222234268706d132fc0e1ca4e55c1eff141b6dc1d4b08762bf29618bdcc9edcf6daa0d4f3bfa90491ee8f8406473dbfe7b7ab41305177de9f5f7c9cc1aee2cbf05a5dff657233300307e94ce64184b7ebca4ae94f500c11d91a1645cef2517284f1b7f6f454b7be1f18c6f98b6472a1c405192278fe635366ddbb051f041d6fb00154472c511085f871e264b2bf99e36412c82387678472ec00518169ec613ab50fce7408e390cafc4dd873f8aa3aa7b3969aecd1d5b85474b7908cb9ef9f9e22c747d7288d779c99d3c4204633f2b7b019ca506951f6c9e4ac070e11d1070ccef354ceb082543d3f52ad8c6bad40c6aeae02cc54dab5a2549de26d20bfd1732397d723372af424529d9f29bfded61d04325e37cde9a53391aaaf05f915bdfbe0e76cecbeb62e23d6cad18b43dfbcea2f96b33d3d6c53a39acec0aebd0f8fc2cb5dff5b42ec56ee34b1ac7745daac57e481c1c039a29a3b0411c872adf379f56907ef3049c3362096154896c249e93274f7d3016e6f6b4d463aa3b69a4e4d227e5343931990bd115e874c24048942f5fbedb5649ea29dbba8f6f9c12a187aa481396d358dcce74be302f8bc722db5e371d060ea6118a11ae6c09133bc325f21596f0110a5de351bec75e3f65cc0a40b0560dec26975019179ca30feca65a989f8b17bb2652cec9aa522276ebd3f3ca9081ad72adf5eabff710ca408c3e84fda2c5253f30449b2f074f046ed36c25d2f32a307049e26394ff2186630e97340d2719309a79c730ef1509751f2835e40fcbb"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000063a80)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000063c80)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2, r3}, {r6}, {r8}, {r9}, {r11}], 0x2, "c50ce04700a302"}) [ 2939.304492] FAULT_INJECTION: forcing a failure. [ 2939.304492] name failslab, interval 1, probability 0, space 0, times 0 [ 2939.307014] CPU: 1 PID: 12119 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 2939.308478] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2939.310221] Call Trace: [ 2939.310800] dump_stack+0x107/0x167 [ 2939.311579] should_fail.cold+0x5/0xa [ 2939.312423] ? __kernfs_new_node+0xd4/0x860 [ 2939.313367] should_failslab+0x5/0x20 [ 2939.314168] kmem_cache_alloc+0x5b/0x310 [ 2939.315032] __kernfs_new_node+0xd4/0x860 [ 2939.315912] ? mark_held_locks+0x9e/0xe0 [ 2939.316780] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2939.317789] ? cpumask_next+0x1f/0x30 [ 2939.318599] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2939.319590] ? pcpu_alloc+0x12a/0x1240 [ 2939.320429] kernfs_new_node+0x18d/0x250 [ 2939.321298] kernfs_create_dir_ns+0x49/0x160 [ 2939.322238] cgroup_mkdir+0x315/0xf50 [ 2939.323052] ? cgroup_destroy_locked+0x710/0x710 [ 2939.324067] kernfs_iop_mkdir+0x14d/0x1e0 [ 2939.324957] vfs_mkdir+0x493/0x750 [ 2939.325711] do_mkdirat+0x150/0x2b0 [ 2939.326479] ? user_path_create+0xf0/0xf0 [ 2939.327357] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2939.328472] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2939.329563] do_syscall_64+0x33/0x40 [ 2939.330344] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2939.331430] RIP: 0033:0x7f371d026b19 [ 2939.332227] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2939.336116] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2939.337740] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 2939.339244] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2939.340751] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2939.342247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2939.343771] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 18:53:25 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x21) 18:53:25 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000940)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x1f, 0x7f, 0x3f, 0x4, 0x0, 0x80000000, 0x204, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0xb}, 0x10000, 0x40, 0x8, 0x3, 0xcb4b, 0x8271, 0x8000, 0x0, 0x2d10}, 0x0, 0xd, r2, 0xb) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x400400000, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0xa, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000280)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x30480, 0xe5) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000380)='./file1\x00', 0x2, 0x5, &(0x7f0000000840)=[{&(0x7f00000003c0)="95f5b4cae06cd3c9c79a81b2d2387bbdcc102c319424388fa0fc1792131a5b2eb761dc2e8039868049355e", 0x2b, 0x2}, {&(0x7f0000000480)="b3a72700ef283bff88f28937f716e28900f74999651771745df314839bfcb94dcf307fac38d41322ea60090cbd16faff962e2ea307062729718bb018a4685a1a3644e2e2207521436556f4328d0502c07bdbd6714aa1229aa94a637a4252ea4622a63c987e57169fb48b3a9e5ad672e49b0cb3842cf20e343c18a3c21fb5d829eef2a48b7579ef2572a4a347d9b2d1874410e1cfef615209cdc2a77e6efb9ac1f649a6b139fbfbaf2136860c1a14833e24ba5c5283efc2e64cdb5fb6b1827ddb81d9193e90806f28080e3a66fda332e98f5e2a2773d42a24139c3147e902b7fc39413f540c64db", 0xe7, 0x2}, {&(0x7f0000000580)="a79c701e96057a59dce33437caca5def2767ed1f6da9cd576b13e076aa5f1a1b7e6c6e5aee333c64d6c4502af79fbf020c30d3d467a4a331bec3b0173dfe8a2eccd5a91352c0084acaec0f0b298d5a6e9a6ad8fd3580888f47b1be292456c1a7d87911528575905f71ab95797ffe09fa2af3096eac0e7b387154bd88511ccf0fc9e55c533bb9ae9f4aa5115529413595e0b0d44b7da4d3a5f9a1a77e78b2737997aeaf932b7caf5be9220ea931ceaa5873bde66e264330bcba54f153b9dac1e7f4247be4da5c7c2b0e721945eecc1598ca998d67a0c9d937310c", 0xda, 0x1}, {&(0x7f0000000680)="ed413eb6fd1681cee5c74d2ff1deea881422aa69b75139068cdf051d0c1a85bbd215d286527a437fcee5b9b6248e30f29878bb0679baa83e8c741125754e09f76695158ba3b688d8c74e05e3b97e0c2f36b558d1d0b77852889cecca55f7c1fbb4403b6d6acc3f76824fb9bb563ef8063e388a4fa946e17f232584bb12d076985936bc01d2c5a5d6b89b183af48e8b203852759ecc5efa9e1fb17714ec842bea52081125edadcf47d10cec18885c9816dbff738dc2c134051b62e758309477df03ef84aafbcf6a2d57961c1acd94cef392754bf1d19f4e7803db", 0xda, 0x7}, {&(0x7f0000000780)="e071e55357639e55cefc2cac2e17cab87d59b493cac3fd54e348a3877d66a541ebcdbce86c6d254dd43932f52ef51b7e78b7b8a6228926722ca100017822fa6ae3120bbbc11ffcae0b4e00b8cd10cf61834ecd81029b7a05db00ce3a62b2eb4eebfbabc86006849d432594a251d0e210a52596fbccbe97122e4ca816a30d6b5a5d292cfbf4cb1483d086ee825231023a084d9f49c7773a0c1b959362f2af179c44b2e42c8c7b1949ed8274e279bd96060304136ce5a51b8017b633b960", 0xbd, 0x100}], 0x821c00, &(0x7f0000000400)={[{@huge_always}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) [ 2939.398938] tmpfs: Unknown parameter '' 18:53:25 executing program 1: mkdirat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') 18:53:25 executing program 6: accept4(0xffffffffffffffff, &(0x7f0000000100)=@xdp, &(0x7f0000000180)=0x80, 0x80000) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x800, 0x5) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c0000002000210c0000000000000000020000000000af018000163b"], 0x1c}}, 0x0) mknodat$null(r1, &(0x7f00000001c0)='./file0\x00', 0x8000, 0x103) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x12, r1, 0x10000000) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000200)=@IORING_OP_WRITE_FIXED={0x5, 0x3, 0x0, @fd=r3, 0x40, 0xfffffffffffffffc, 0x101, 0x1, 0x0, {0x1}}, 0xdb6) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:53:25 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') umount2(&(0x7f0000000040)='./file0/file0\x00', 0x6) chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000300)='./file1\x00', 0x5, 0x1, &(0x7f0000000400)=[{&(0x7f0000000340), 0x0, 0xffffffff}], 0x1000400, &(0x7f0000000740)={[{@nonumtail}, {@shortname_lower}], [{@fowner_lt={'fowner<', r5}}, {@dont_hash}, {@uid_eq={'uid', 0x3d, r3}}, {@audit}, {@obj_type={'obj_type', 0x3d, 'smackfsroot'}}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x64, 0x63, 0x33, 0x66, 0x50, 0x37, 0x30], 0x2d, [0x36, 0x30, 0x64, 0x39], 0x2d, [0x63, 0x35, 0x34, 0x62], 0x2d, [0x36, 0x0, 0x63, 0x30], 0x2d, [0x33, 0x39, 0x65, 0x0, 0x66, 0x0, 0x36, 0x62]}}}, {@smackfsdef={'smackfsdef', 0x3d, 'smackfsroot'}}, {@smackfsroot={'smackfsroot', 0x3d, 'smackfsroot'}}]}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:53:25 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 17) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:53:25 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x60ff) 18:53:25 executing program 1: r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') 18:53:25 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) chmod(&(0x7f0000000040)='./file1\x00', 0x180) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000700)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB='o*', @ANYRESHEX=r0, @ANYBLOB=',dfltuid=', @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=r3, @ANYBLOB=',mask=MAY_APPEND,measure,fsuuid=75d1fb27-7ab5-2c03-5304-afcb01cf,\x00']) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r4}, 0x14) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) openat(r5, &(0x7f0000000300)='./file1\x00', 0x80, 0x10) [ 2939.598305] FAULT_INJECTION: forcing a failure. [ 2939.598305] name failslab, interval 1, probability 0, space 0, times 0 [ 2939.602883] CPU: 0 PID: 12145 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 2939.604334] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2939.606050] Call Trace: [ 2939.606610] dump_stack+0x107/0x167 [ 2939.607365] should_fail.cold+0x5/0xa [ 2939.608174] ? create_object.isra.0+0x3a/0xa20 [ 2939.609220] should_failslab+0x5/0x20 [ 2939.610090] kmem_cache_alloc+0x5b/0x310 [ 2939.611021] create_object.isra.0+0x3a/0xa20 [ 2939.612025] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2939.613198] kmem_cache_alloc+0x159/0x310 [ 2939.614161] __kernfs_new_node+0xd4/0x860 [ 2939.615113] ? mark_held_locks+0x9e/0xe0 [ 2939.616043] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2939.617139] ? cpumask_next+0x1f/0x30 [ 2939.618017] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2939.619085] ? pcpu_alloc+0x12a/0x1240 [ 2939.619982] kernfs_new_node+0x18d/0x250 [ 2939.620919] kernfs_create_dir_ns+0x49/0x160 [ 2939.621930] cgroup_mkdir+0x315/0xf50 [ 2939.622812] ? cgroup_destroy_locked+0x710/0x710 [ 2939.623898] kernfs_iop_mkdir+0x14d/0x1e0 [ 2939.624862] vfs_mkdir+0x493/0x750 [ 2939.625675] do_mkdirat+0x150/0x2b0 [ 2939.626503] ? user_path_create+0xf0/0xf0 [ 2939.627456] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2939.628661] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2939.629854] do_syscall_64+0x33/0x40 [ 2939.630702] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2939.631858] RIP: 0033:0x7f371d026b19 [ 2939.632710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2939.636879] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2939.638602] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 2939.640236] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2939.641861] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2939.643557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2939.645231] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 [ 2939.700277] tmpfs: Unknown parameter '' 18:53:40 executing program 1: r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') 18:53:40 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) renameat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00', 0x1) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) getsockopt$netlink(r2, 0x10e, 0x7, &(0x7f00000004c0)=""/160, &(0x7f0000000000)=0xa0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000380)={'wlan0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x7}}, './file0\x00'}) 18:53:40 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./fi]e1\x00']) r2 = openat(r1, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x81) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000000, 0x4010, r2, 0x10000000) syz_io_uring_submit(0x0, r4, &(0x7f0000000100)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd=r2, 0x8, 0x0, 0x2, 0x0, 0x1}, 0x9) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') copy_file_range(0xffffffffffffffff, &(0x7f0000000200)=0x3, r0, &(0x7f0000000240)=0xf2d9, 0x7177, 0x0) 18:53:40 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 18) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:53:40 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x80000) 18:53:40 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) futimesat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)={{0x0, 0xea60}, {0x0, 0xea60}}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x32, 0x34], 0x2d, [0x61, 0x39, 0x63, 0x33, 0x30, 0x31, 0x63, 0x63]}}}]}}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:53:40 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) rename(&(0x7f0000000040)='./mnt\x00', &(0x7f0000000300)='mnt/encrypted_dir\x00') r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udp(0xa, 0x2, 0x0) openat(r0, &(0x7f0000000440)='./file1\x00', 0x1, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000700)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x7fH\x12z\x8ad\xf2\x9c{\xec\x8f\x99V\xb7\xf8\x9f\xcc\xfc\x8co\x1aW\xee\x00\x9cj$\xe4\xdf\xe8Gbx^\xa3b(\xfe\\\x10\xfbz>\xbb.\xdf\x97{.\xd9/D\xb3\xb7\x87\xb7or\xcc*O\xd3\x03\x97Ech\xf2\x1e\xda\x1f\a\x00\x05\xd4\x90\x81\xa0\x96\v\v\xf2\x87\x91\xbf\x0f\x1c\x00\x00\x01\x00\x00\x00\x00\x00M'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x38, 0x37], 0x2d, [0x37, 0x65, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x35], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0x20, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) setsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f0000000000)={@local, r5}, 0x14) 18:53:40 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') [ 2954.691166] FAULT_INJECTION: forcing a failure. [ 2954.691166] name failslab, interval 1, probability 0, space 0, times 0 [ 2954.694011] CPU: 0 PID: 12169 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 2954.695226] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2954.696699] Call Trace: [ 2954.697160] dump_stack+0x107/0x167 [ 2954.697788] should_fail.cold+0x5/0xa [ 2954.698444] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2954.699449] should_failslab+0x5/0x20 [ 2954.700099] kmem_cache_alloc+0x5b/0x310 [ 2954.700814] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2954.701786] radix_tree_extend+0x231/0x490 [ 2954.702517] idr_get_free+0x623/0x8f0 [ 2954.703185] idr_alloc_u32+0x170/0x2d0 [ 2954.703855] ? __fprop_inc_percpu_max+0x130/0x130 [ 2954.704687] ? lock_acquire+0x197/0x470 [ 2954.705374] ? __kernfs_new_node+0xff/0x860 [ 2954.706117] idr_alloc_cyclic+0x102/0x230 [ 2954.706839] ? idr_alloc+0x130/0x130 [ 2954.707476] ? rwlock_bug.part.0+0x90/0x90 [ 2954.708211] __kernfs_new_node+0x117/0x860 [ 2954.708951] ? mark_held_locks+0x9e/0xe0 [ 2954.709654] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2954.710476] ? cpumask_next+0x1f/0x30 [ 2954.711128] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2954.711932] ? pcpu_alloc+0x12a/0x1240 [ 2954.712616] kernfs_new_node+0x18d/0x250 [ 2954.713328] kernfs_create_dir_ns+0x49/0x160 [ 2954.714086] cgroup_mkdir+0x315/0xf50 [ 2954.714750] ? cgroup_destroy_locked+0x710/0x710 [ 2954.715562] kernfs_iop_mkdir+0x14d/0x1e0 [ 2954.716269] vfs_mkdir+0x493/0x750 [ 2954.716887] do_mkdirat+0x150/0x2b0 [ 2954.717510] ? user_path_create+0xf0/0xf0 [ 2954.718229] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2954.719130] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2954.720015] do_syscall_64+0x33/0x40 [ 2954.720654] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2954.721539] RIP: 0033:0x7f371d026b19 [ 2954.722176] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2954.725327] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2954.726630] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 2954.727852] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2954.729083] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2954.730319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2954.731508] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 18:53:41 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0xf0ff1f) 18:53:41 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x1, &(0x7f0000000200)=[{&(0x7f0000000180), 0x0, 0x2}], 0x300088, &(0x7f0000000240)={[{@barrier}, {@delalloc}, {@nogrpid}, {@data_writeback}, {@noblock_validity}, {@abort}, {@noblock_validity}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xf12}}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x64, 0x31, 0x33, 0x30, 0x30], 0x2d, [0x34, 0x65, 0x38, 0x37], 0x2d, [0x38, 0x64, 0x30, 0x30], 0x2d, [0x37, 0x64, 0x39, 0x60], 0x2d, [0x31, 0x63, 0x35, 0x37, 0x37, 0x30, 0x36, 0x34]}}}, {@smackfsroot={'smackfsroot', 0x3d, 'proc\x00'}}]}) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x6) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') 18:53:41 executing program 1: r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') 18:53:41 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'}) openat(r1, &(0x7f0000000100)='./file0\x00', 0x2002, 0x4) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:53:41 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x1000000) 18:53:41 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000b40)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) move_mount(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', r2, &(0x7f0000000b80)='./file1\x00', 0x10) syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0x4, 0x9, &(0x7f00000009c0)=[{&(0x7f00000001c0)="c68f339c673d5e91ede238c18289c671e2170b408c64160e2227e0363e8bec59dd6445e4f4ebb104392ef365b465ce256933c7aad1844ad99783452f6ae84c537f67df73eea5d2095e1c54786f16d23e2b8a746556f1495726f0e7f9dc8a26688ea7666a79ffedba333ef87a0eef4a73fa1854a1a891ba4120b66b83ba1a1548989770ff92edf9b1f041340f1716841363571c719293682629ae0841b2b578650ca70172047294449ef26fc4b1747816fe", 0xb1, 0x2}, {&(0x7f0000000280)="4afa57edd84d555891e6aa36db08024436a40dd101615fb6a8fb9606a01082a29d32a9634389a66019d76f8766da10a2b5084c2020940c1cd47e34338a03138ca558684bb3efb44993cf81ca50b28a74898dd09bb72e1112bf31ea90c59339535d01660847710b19a3e452148e2cadde865c34fbccd2eddf09f4008a96d8173d805277e0e7284847e3ff39caaee5f12f7eb3045ce59ea1ad5065764b01c8", 0x9e}, {&(0x7f0000000340)="e937ef952bdc6a1199d4fab40d76b78ff770836e3a11017237579c8b736da13664e2e5e16e2dd819bc8366ceb4091adb7f0d5ceeb81178053e5176e6b83935f5d1152435c19de8cd3dea113b169e7adfbeab0aef77ad739dfd70cd20b71a06de90f8b068b09c18c4cb8b36b2369857348c17fa361a2da65eeea9ca756afc4fa9fbd61e15391c441b6fd6925510e8322f797f83aa0e822e88dfb605bd95711d11b92ddf0cee0a4cf8bddfe996bef783abde8b807551f3d026735f080f2ded30f9f4b4123ee1bfee57a6116e4eb5f5eff5da791326a6fc5fa32e463a25cc7cfacd85f481c5518459d4c2", 0xe9, 0x6}, {&(0x7f0000000480)="dfea35b8082b565956afe6edeb1e8a57554f673d8301dd89605a0845f144349db05b1906a16c69ce28a8f7229543b5427c514de7b41e05ec243c90ca7ed82107048a4b18a819ff5c63961be914e3730228d28cc4ce2c001dd848af923b31a94bc70f41afa927f3d916941001220f7b05052639b255e127728bb7a40c183128f52803f2c9bc5144a97e0cabed1eb953724ad4b092a619c09458a09a0ba97913652d0e3a7532aaafd78395ff405d529be7a8de8b2aab8086a11c2355f72d5a239289d02b583ef46321a55c2ae4edabcfd001371c662087cfd828b796ac1dffee9258ab5c0dd4e85ffed948aea1f71839789c3b", 0xf2}, {&(0x7f0000000580)="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", 0xfb, 0x7}, {&(0x7f0000000680)="2a47b2f71fe5a16dc4b642efb98d91b48ffe57bbb9afb709457dcc3cd2e4db3bf47f714d279ecff80bf9ee68ecda6661ee7fca6d7ba5f158156c6d8331026dff9bef661fbdf0a5fab85929dbb72cfbd1515e957bb121acc641137855f06a44c315529f3485057776a8cd1f94358000ed78c81f610c12a6f418a38e234080f27679edcbef9bbd45d9f5", 0x89, 0x76dc}, {&(0x7f0000000740)="c3714993c844799b5bf2c1ef9cc16c1823268d7af6f1ce9847cfef436a3bbda50d6b9095a33cf7469562c283ee2a36f3bc01ed2306f48f80d297f3255add377fcc6424e40091a83cb6f55c3d3a2961b77e03f42e3900373b57c92d1ad0b72a2f998e1451545a3f5d1cfed77bbbd1d6f9a2ecf340d9f08764d4acfb102511f091834a9122f465d26645b0bbebd7228827e711edac6d67232966b6d2870bc580a86a8ebe57c7e321a6ff98f7664f80d876c98879d9b81445b631d2fa8538138ba2b3a886", 0xc3, 0x5}, {&(0x7f0000000840)="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", 0xfa}, {&(0x7f0000000940)="24cdeb0bab8855164b8a9fe1c78767af2de8c59bf1e7fcbb60afa2daceac4e70d097c925216782814a42e11a9dc4330a2c078d9eac2c61fe4f27290d9644484ac8da693f53869394ce54fd66179660ccdccd0730fe99cacc9c9bc1fb", 0x5c, 0x800}], 0x4000, &(0x7f0000000ac0)={[{'#'}, {}, {')^'}, {'.:+H!'}], [{@fsmagic={'fsmagic', 0x3d, 0x2b}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@appraise_type}]}) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') [ 2954.886114] tmpfs: Unknown parameter '' [ 2954.917000] loop7: detected capacity change from 0 to 60416 [ 2954.933889] nfs4: Unknown parameter '#' 18:53:56 executing program 7: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', r0, &(0x7f00000001c0)='./file2\x00', 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x138) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:53:56 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x2000000) 18:53:56 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0xfffffffc, 0x0, 0x2, 0xfffffffe}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000001540)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[], 0x30}}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd_index, 0x0, 0x0}, 0x80000001) syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000001540)=0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r6, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[], 0x30}}, 0x0) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd_index, 0x0, 0x0}, 0x80000001) r7 = syz_io_uring_setup(0x41ac, &(0x7f00000002c0)={0x0, 0x0, 0x1, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000080)=@IORING_OP_POLL_REMOVE={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r10}}, 0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000240)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000200)={0x77359400}, 0x1, 0x0, 0x0, {0x0, r10}}, 0xc161) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)=ANY=[@ANYBLOB="180000200021f9000000000000000080005e91b4066277ed1def121e62ac5dd65384815eb9b7d6860141514b7ec74a25987972fe12c488d11976ae61005d59d3c4dbc55a00a381bdca52b70cef4b9bce7982c5453dadc313cf2534d2b778e1818bc561f12e74f8226dd3c8e4a1a6"], 0x18}}, 0x20000010) read(0xffffffffffffffff, &(0x7f0000000340)=""/224, 0xe0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)={{r11, r12/1000+60000}}) 18:53:56 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r1 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r2}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) 18:53:56 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:53:56 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) syz_80211_join_ibss(&(0x7f00000000c0)='wlan0\x00', &(0x7f0000000100)=@default_ap_ssid, 0x6, 0x2) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:53:56 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 19) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:53:56 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') [ 2970.261349] FAULT_INJECTION: forcing a failure. [ 2970.261349] name failslab, interval 1, probability 0, space 0, times 0 [ 2970.264027] CPU: 0 PID: 12212 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 2970.265551] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2970.267331] Call Trace: [ 2970.267911] dump_stack+0x107/0x167 [ 2970.268704] should_fail.cold+0x5/0xa [ 2970.269600] ? create_object.isra.0+0x3a/0xa20 [ 2970.270595] should_failslab+0x5/0x20 [ 2970.271421] kmem_cache_alloc+0x5b/0x310 [ 2970.272302] ? stack_trace_consume_entry+0x160/0x160 [ 2970.273424] create_object.isra.0+0x3a/0xa20 [ 2970.274370] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2970.275469] kmem_cache_alloc+0x159/0x310 [ 2970.276374] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2970.277617] radix_tree_extend+0x231/0x490 [ 2970.278546] idr_get_free+0x623/0x8f0 [ 2970.279387] idr_alloc_u32+0x170/0x2d0 [ 2970.280231] ? __fprop_inc_percpu_max+0x130/0x130 [ 2970.281294] ? lock_acquire+0x197/0x470 [ 2970.282153] ? __kernfs_new_node+0xff/0x860 [ 2970.283095] idr_alloc_cyclic+0x102/0x230 [ 2970.283988] ? idr_alloc+0x130/0x130 [ 2970.284788] ? rwlock_bug.part.0+0x90/0x90 [ 2970.285748] __kernfs_new_node+0x117/0x860 [ 2970.286663] ? mark_held_locks+0x9e/0xe0 [ 2970.287548] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2970.288575] ? cpumask_next+0x1f/0x30 [ 2970.289421] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2970.290432] ? pcpu_alloc+0x12a/0x1240 [ 2970.291284] kernfs_new_node+0x18d/0x250 [ 2970.292171] kernfs_create_dir_ns+0x49/0x160 [ 2970.293128] cgroup_mkdir+0x315/0xf50 [ 2970.293984] ? cgroup_destroy_locked+0x710/0x710 [ 2970.295013] kernfs_iop_mkdir+0x14d/0x1e0 [ 2970.295919] vfs_mkdir+0x493/0x750 [ 2970.296699] do_mkdirat+0x150/0x2b0 [ 2970.297516] ? user_path_create+0xf0/0xf0 [ 2970.298418] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2970.299550] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2970.300670] do_syscall_64+0x33/0x40 [ 2970.301502] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2970.302603] RIP: 0033:0x7f371d026b19 [ 2970.303407] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 18:53:56 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r2, 0x200, 0x70bd2d, 0x80, {{}, {@val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x4) tee(r0, r1, 0x3, 0x4) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r4, &(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r5, 0x29, 0x11, &(0x7f0000000b00)=0x7, 0x4) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) [ 2970.307342] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2970.309156] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 2970.310691] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2970.312221] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2970.313753] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2970.315261] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 18:53:56 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') [ 2970.351663] tmpfs: Unknown parameter '' 18:53:56 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x1ffff000) 18:53:56 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1010a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000005e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) openat(r0, &(0x7f0000000040)='./file1\x00', 0x1, 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000280)={'veth0_vlan\x00', &(0x7f0000000400)=@ethtool_flash={0x33, 0x0, './file1\x00'}}) 18:53:56 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f00000000c0)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) utimensat(r0, &(0x7f0000000100)='./file2\x00', &(0x7f0000000240)={{0x0, 0xea60}, {0x77359400}}, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c0000002000210c0000000000001000020000000000af0180000000"], 0x1c}}, 0x0) faccessat(r2, &(0x7f0000000040)='./file2\x00', 0x100) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:53:56 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') 18:53:56 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000200)='ext2\x00', &(0x7f0000000240)='./file0/file1\x00', 0x2, 0x5, &(0x7f00000007c0)=[{&(0x7f00000004c0)="3633097cebaa77e2da12b8f51c413874c1144913fbb72d3a3bdae6c32cb37f63171015b9979e221550714cd4cf7966ba05ea2e3ecb3248a30b08b898e3cec946e89364cbf7ec83b2827e4d54d76c34726c6400d044e0f06698e553d6ac9d8b2187bc21e3fc22d27bd85966e92c484e588a358d575308fee4f2a06f1e793ad86643dad9baa911e590ca71148096f240faa6efce58e92e8665c8ea408350e3aa150ef360e2d836c8739002acf498f9c515af7470492046d0d60d3d3a3680f9b90a3b716719d27bd6c673e025c0bf295ab77873a3c5acba74a8621942204c0c1ca53da2e00c757267", 0xe7, 0x2}, {&(0x7f00000003c0)="6521caad1e5c3084405f91af4807240fd349b0febe0aafac73f5e732652796903e16adfbf11d1cca08a92ba526cafb593229aff9209d7841c10a14f5ce0c574419aef823f3c08c77c64ab986b7caa639fbc354dbf735390d85327dcb70fca98f03597701d737d3ce2add5976a21ddcfa0d94d803cc3a", 0x76, 0xdb}, {&(0x7f00000005c0)="3dd5187a2bcaebad14be1d4a36a887cc19a32304aeb231a028a8d744b87f50180034194537670a60b06e6f5a201af336826b577cb08489317894d9f2bdf91b8fb6be50cb556119a1fb4ac3ada13c00aaaa02a74f83ae6e462fad769a90066dc207aab93137d7e2b54e130c4a9384b4368252082a7a85bfb64c90a25ebfdaa82598589cda08fb95778140f8c9ba0fe258fc47f07fcdeb849b7beac927cf55318953e0c369b73b4bc9a5f4e0786653928aafa96df9ae9668680af9749eb819325f0935ebc27711ea4cce2bbfd8603edb93a5e37d299247e91bd50b705f46a42b93ea", 0xe1, 0x6}, {&(0x7f00000006c0)="290c4d092a89c16e1a773a8c817ec3e14ab004f0116cbe5e156ecfa92117c8f2aad0538187d3050061a0ed2890e4628acf290e8f960b770033d4a80d32ec7d63e8cbb3dffd51621ee1461d", 0x4b}, {&(0x7f0000000740)="f1eda774f25f6af5d8bc7d80c86921df2dbf4594a5b91bd7450cec385d3b7376231c148b6848f9028cdcdddb027644149f160aaf80a79a6dee930bf281f49adede7e5e141ba7767df9f8f9d36eee3cb2588c9e432a8bcfae668f3bead4cb40f4d1fb75", 0x63, 0x401}], 0x2002000, &(0x7f0000000440)={[], [{@uid_lt}, {@subj_user={'subj_user', 0x3d, '(^'}}, {@appraise_type}]}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x9c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r2 = add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)={0x3, 0x0, @d}, 0x18, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000000000085baa174f0cb114200000000000000000000000000000000000000000000000040000000", @ANYRES32=r2, @ANYBLOB="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"]) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') 18:53:56 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x20000000) 18:53:56 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 20) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:53:56 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat(r1, &(0x7f00000001c0)='./file0\x00', 0x440800, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)=ANY=[@ANYRES32], 0x1c}}, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) renameat2(r1, &(0x7f0000000180)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) accept4$unix(r2, 0x0, &(0x7f0000000100), 0x80000) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x14a) [ 2970.596932] loop5: detected capacity change from 0 to 2048 [ 2970.666896] FAULT_INJECTION: forcing a failure. [ 2970.666896] name failslab, interval 1, probability 0, space 0, times 0 [ 2970.669251] CPU: 1 PID: 12258 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 2970.670490] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2970.672025] Call Trace: [ 2970.672513] dump_stack+0x107/0x167 [ 2970.673214] should_fail.cold+0x5/0xa [ 2970.673908] should_failslab+0x5/0x20 [ 2970.674597] __kmalloc_track_caller+0x79/0x370 [ 2970.675506] ? security_context_to_sid_core+0xb4/0x890 [ 2970.676509] kmemdup_nul+0x2d/0xa0 [ 2970.677197] security_context_to_sid_core+0xb4/0x890 [ 2970.678167] ? security_compute_sid.part.0+0x16e0/0x16e0 [ 2970.679195] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2970.680185] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2970.681253] ? trace_hardirqs_on+0x5b/0x180 [ 2970.682062] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2970.683089] security_context_to_sid+0x35/0x50 [ 2970.683953] selinux_kernfs_init_security+0x19d/0x4c0 [ 2970.684956] ? selinux_file_mprotect+0x610/0x610 [ 2970.685862] ? find_held_lock+0x2c/0x110 [ 2970.686638] ? __kernfs_new_node+0x2ad/0x860 [ 2970.687465] ? lock_downgrade+0x6d0/0x6d0 [ 2970.688246] ? rwlock_bug.part.0+0x90/0x90 [ 2970.689087] security_kernfs_init_security+0x4e/0xb0 [ 2970.690075] __kernfs_new_node+0x531/0x860 [ 2970.690871] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2970.691765] ? cpumask_next+0x1f/0x30 [ 2970.692518] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2970.693410] ? pcpu_alloc+0x12a/0x1240 [ 2970.694146] kernfs_new_node+0x18d/0x250 [ 2970.694919] kernfs_create_dir_ns+0x49/0x160 [ 2970.695749] cgroup_mkdir+0x315/0xf50 [ 2970.696514] ? cgroup_destroy_locked+0x710/0x710 [ 2970.697416] kernfs_iop_mkdir+0x14d/0x1e0 [ 2970.698200] vfs_mkdir+0x493/0x750 [ 2970.698873] do_mkdirat+0x150/0x2b0 [ 2970.699556] ? user_path_create+0xf0/0xf0 [ 2970.700364] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2970.701366] do_syscall_64+0x33/0x40 [ 2970.702058] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2970.703012] RIP: 0033:0x7f371d026b19 [ 2970.703712] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2970.707732] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2970.709389] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 2970.710976] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2970.712490] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2970.713982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2970.715398] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 [ 2970.750415] tmpfs: Unknown parameter '' 18:54:10 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 21) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:54:10 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) openat(r0, &(0x7f00000001c0)='./file1\x00', 0x20202, 0x106) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r0, &(0x7f0000000040)='./file1\x00', r1, 0xee00, 0x100) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:54:10 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x1, 0x1) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000300)=@v2={0x2, @aes128, 0x1, '\x00', @auto="603581e6bcc2361cfbc7461009e357e4"}) mount(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000000c0)='proc\x00', 0x2000, 0x0) rename(&(0x7f0000000100)='./file1\x00', &(0x7f0000000080)='./file0\x00') chown(&(0x7f00000002c0)='./file1\x00', 0xee01, 0xee00) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140), &(0x7f0000000200)={0x0, 0xfb, 0xb0, 0x4, 0x3f, "27d02e96392b58056b46e4c179293a72", "f749a04f2d49b3509737247408116814695dc73f9e48c221dd26b2ced34e23665b3ca8eef351aaa72ed54907109e92d7837c5ce2553a62b49b092158653c9b8b57942a3a280c7264f6d2fb55a8f979a9c7fa605d29590d369554f8e1738cb1b592eb89772a44ec25c6b0d6eaaa2b73eeb8902c66f44e9000463a20b6ffa0be52556aa13f5516d5a25017f9f6378d75624ac48e9a468ea8203ab82b"}, 0xb0, 0x2) 18:54:10 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x21000000) 18:54:10 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) openat(r0, &(0x7f0000000040)='./mnt\x00', 0x100, 0x12) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x242c, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}, {@afid={'afid', 0x3d, 0xe8e8}}, {}, {@afid={'afid', 0x3d, 0x4}}, {@dfltgid}, {@cache_loose}, {@loose}], [{@fsmagic={'fsmagic', 0x3d, 0x1}}, {@obj_user={'obj_user', 0x3d, '\''}}]}}) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000002c0)='./file1\x00', 0x5, 0x1, &(0x7f0000000300)=[{&(0x7f0000000440)="8b09986ca61ada9075893142a4808e0450c74f1541ece848cad1ed3f089e5324e5a5bb7cb6262af90b7cd58964e2ad149440126ad22ad89b84d838ba3e3b87c6e97bc3840e059c7e829d5746bae90e30ed9fad5b905da5ad", 0x58, 0x8000}], 0x520401, &(0x7f0000000700)={[{@size={'size', 0x3d, [0x30, 0x65, 0x33]}}, {}, {@mpol={'mpol', 0x3d, {'interleave', '=static', @val={0x3a, [0x2d, 0x39, 0x39, 0x35, 0x37]}}}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x38, 0x39]}}, {@gid}, {@nr_blocks={'nr_blocks', 0x3d, [0x39, 0x33, 0x74]}}, {@huge_within_size}, {@gid}, {@mode={'mode', 0x3d, 0x3}}], [{@hash}, {@seclabel}, {@uid_gt={'uid>', r5}}, {@subj_role={'subj_role', 0x3d, 'measure'}}]}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r6}, 0x14) 18:54:10 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') 18:54:10 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0xfffffffffffffd45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}, 0x0, 0x8}, 0x0, 0xffffffffffffefff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:54:10 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="dd138005942ba60d04161257dd1ce78b8316696aa4378c3811483fe3036598f2e64b0300a1f27f803a4eabc1e0e4654c313e6b9ac6962e1c3996fc483e0b478a3a8ac30cc1e8f3932d799f2454322dc8ceac68ef44867582036037138e7dc5c860930dbfb8c4d4d44e3b3140b9eff7caf5b4d6", 0x73, 0x2}, {&(0x7f00000001c0)="b0d2239a81facbe65a2d3299d70ac561561afcaecef934d8c8d9", 0x1a, 0x80}], 0x2, &(0x7f0000000240)={[{':+'}]}) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:54:10 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') 18:54:10 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000001540)=0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[], 0x30}}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd_index, 0x0, 0x0}, 0x80000001) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100), 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x4c, r5, 0x8, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000040) r6 = socket$netlink(0x10, 0x3, 0x10) r7 = syz_io_uring_setup(0x41ac, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000080)=@IORING_OP_POLL_REMOVE={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r10}}, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f00000000c0)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, r6, &(0x7f0000000040), 0x0, 0x0, 0x40000, 0x0, {0x0, r10}}, 0x4) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') [ 2984.220467] nfs4: Unknown parameter ':+' [ 2984.233195] FAULT_INJECTION: forcing a failure. [ 2984.233195] name failslab, interval 1, probability 0, space 0, times 0 [ 2984.234759] CPU: 0 PID: 12282 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 2984.235629] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2984.236659] Call Trace: [ 2984.236990] dump_stack+0x107/0x167 [ 2984.237452] should_fail.cold+0x5/0xa [ 2984.237960] ? ___slab_alloc+0x155/0x700 [ 2984.238464] ? create_object.isra.0+0x3a/0xa20 [ 2984.239029] should_failslab+0x5/0x20 [ 2984.239497] kmem_cache_alloc+0x5b/0x310 [ 2984.240000] create_object.isra.0+0x3a/0xa20 [ 2984.240541] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2984.241170] kmem_cache_alloc+0x159/0x310 [ 2984.241715] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2984.242408] idr_get_free+0x4b5/0x8f0 [ 2984.242891] idr_alloc_u32+0x170/0x2d0 [ 2984.243375] ? __fprop_inc_percpu_max+0x130/0x130 [ 2984.243978] ? lock_acquire+0x197/0x470 [ 2984.244473] ? __kernfs_new_node+0xff/0x860 [ 2984.245012] idr_alloc_cyclic+0x102/0x230 [ 2984.245524] ? idr_alloc+0x130/0x130 [ 2984.245995] ? rwlock_bug.part.0+0x90/0x90 [ 2984.246526] __kernfs_new_node+0x117/0x860 [ 2984.247046] ? mark_held_locks+0x9e/0xe0 [ 2984.247554] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2984.248143] ? cpumask_next+0x1f/0x30 [ 2984.248617] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2984.249196] ? pcpu_alloc+0x12a/0x1240 [ 2984.249703] kernfs_new_node+0x18d/0x250 [ 2984.250209] kernfs_create_dir_ns+0x49/0x160 [ 2984.250760] cgroup_mkdir+0x315/0xf50 [ 2984.251234] ? cgroup_destroy_locked+0x710/0x710 [ 2984.251824] kernfs_iop_mkdir+0x14d/0x1e0 [ 2984.252338] vfs_mkdir+0x493/0x750 [ 2984.252783] do_mkdirat+0x150/0x2b0 [ 2984.253228] ? user_path_create+0xf0/0xf0 [ 2984.253757] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2984.254395] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2984.255009] do_syscall_64+0x33/0x40 [ 2984.255461] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2984.256088] RIP: 0033:0x7f371d026b19 [ 2984.256528] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2984.258796] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2984.259725] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 2984.260579] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2984.261452] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2984.262317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2984.263195] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 18:54:10 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') [ 2984.291545] nfs4: Unknown parameter ':+' 18:54:10 executing program 5: sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x14, 0x0, 0x10, 0x70bd2c, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x20000844}, 0x20000010) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='./file0\x00') [ 2984.401759] tmpfs: Unknown parameter '' [ 2997.979917] FAULT_INJECTION: forcing a failure. [ 2997.979917] name failslab, interval 1, probability 0, space 0, times 0 [ 2997.981321] CPU: 1 PID: 12308 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 2997.982107] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2997.983053] Call Trace: [ 2997.983357] dump_stack+0x107/0x167 [ 2997.983772] should_fail.cold+0x5/0xa [ 2997.984208] ? create_object.isra.0+0x3a/0xa20 [ 2997.984721] should_failslab+0x5/0x20 [ 2997.985145] kmem_cache_alloc+0x5b/0x310 [ 2997.985610] create_object.isra.0+0x3a/0xa20 [ 2997.986115] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2997.986703] __kmalloc_track_caller+0x177/0x370 [ 2997.987226] ? security_context_to_sid_core+0xb4/0x890 [ 2997.987820] kmemdup_nul+0x2d/0xa0 [ 2997.988221] security_context_to_sid_core+0xb4/0x890 [ 2997.988790] ? security_compute_sid.part.0+0x16e0/0x16e0 [ 2997.989401] ? do_raw_spin_lock+0x121/0x260 [ 2997.989881] ? rwlock_bug.part.0+0x90/0x90 [ 2997.990373] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2997.990920] ? do_raw_spin_unlock+0x4f/0x220 [ 2997.991412] ? _raw_spin_unlock+0x1a/0x30 [ 2997.991879] security_context_to_sid+0x35/0x50 [ 2997.992395] selinux_kernfs_init_security+0x19d/0x4c0 [ 2997.992976] ? selinux_file_mprotect+0x610/0x610 [ 2997.993507] ? find_held_lock+0x2c/0x110 [ 2997.993968] ? __kernfs_new_node+0x2ad/0x860 [ 2997.994488] ? lock_downgrade+0x6d0/0x6d0 [ 2997.994951] ? rwlock_bug.part.0+0x90/0x90 [ 2997.995442] security_kernfs_init_security+0x4e/0xb0 [ 2997.996014] __kernfs_new_node+0x531/0x860 [ 2997.996495] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2997.997026] ? cpumask_next+0x1f/0x30 [ 2997.997454] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2997.997978] ? pcpu_alloc+0x12a/0x1240 [ 2997.998430] kernfs_new_node+0x18d/0x250 [ 2997.998883] kernfs_create_dir_ns+0x49/0x160 [ 2997.999377] cgroup_mkdir+0x315/0xf50 [ 2997.999802] ? cgroup_destroy_locked+0x710/0x710 [ 2998.000334] kernfs_iop_mkdir+0x14d/0x1e0 [ 2998.000800] vfs_mkdir+0x493/0x750 [ 2998.001207] do_mkdirat+0x150/0x2b0 [ 2998.001613] ? user_path_create+0xf0/0xf0 [ 2998.002077] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2998.002670] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2998.003246] do_syscall_64+0x33/0x40 [ 2998.003662] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2998.004526] RIP: 0033:0x7f371d026b19 [ 2998.004972] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2998.007175] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2998.008022] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 2998.008815] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2998.009605] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2998.010403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2998.011201] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 [ 2998.039061] tmpfs: Unknown parameter '' 18:54:24 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') 18:54:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 22) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:54:24 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:54:24 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000002000210c0000000000000000020000000000af0180005b0e6b1ed6ec8e866d50ba0000"], 0x1c}}, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x8000, 0x101) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') 18:54:24 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0xff600000) 18:54:24 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000280)='./mnt\x00', 0x0, 0x20) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:54:24 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = open_tree(r0, &(0x7f0000000040)='./file2\x00', 0x1) r4 = perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x9, 0x1, 0x8, 0x20, 0x0, 0xff, 0x0, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000300), 0x8}, 0x2, 0x8db0, 0x4, 0x2, 0x1, 0x4, 0x3, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) r5 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r6}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r7}, 0x14) 18:54:24 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x5, 0x4}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:54:24 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x4) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:54:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 23) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:54:24 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = syz_mount_image$iso9660(&(0x7f0000000740), &(0x7f0000000780)='mnt/encrypted_dir\x00', 0x6, 0x6, &(0x7f0000000b40)=[{&(0x7f00000007c0)="242b5e3567793b5a5eb1af0a1559e66698967f9525dbb99881c99417280908f5bb7cd3277f7f3898b764d6f0587a67ccb8ffbe1414b661af3a6c448561a0fb60", 0x40, 0x9}, {&(0x7f0000000800)="a447851c68d004110a65ef0f1130dd75ce99fbe01ce26f1a9255249a61bf47cad4efd01b0e00c5a260c9cfdcdcd2cbc6c13156d3f3c9aa79832f9226f35d7799ada152d5258ef15e07bddc792bb96bc71f687e2bbb7cb25a94f5546413785c8f35056ed19726c9134dd5eff80805e150a5d248f7b615279ffd4a2ccd3ce451aa4584940b9fd74a0cc73ebc9ebe6df5d04537af12eae49ef26136fb44b61a0595f9d3810819cf8c6410fec11d13e1c44e58350fcd89c5cc745ac70a2299fafda85a303f687d17ba9e3a6db60664a864bfba", 0xd1, 0x80}, {&(0x7f0000000900)="82c6d7ef58f9d89512a22202b44843edd130b099901e8731e0c2a8fbcfdefab3b236375a38e856e53731442f87b91a991c3e5c02679324bd89068a2c6cd65228449d17e25a4a5dd565febfd7", 0x4c, 0x7db}, {&(0x7f0000000980)="65f779578175220728600d87d331ce5baa462cc3b8eecf3ff4ae0e3c441fffc60953442cc53b64292fe6d1fdf25af0e64d09cb99bdfb5e42391c23de8f13bc3c574e97f8b94da58f14a3d293f9cdb835a581ba8a6590ed", 0x57, 0x9}, {&(0x7f0000000a00)="875f7dbb64f639cf5ab7913061718d00c6b14178f5ffb8b82b50ce18cc5f6652620f8a3b4d5bedefc52ab9d2771bebd6a2d1f17d99", 0x35, 0x6d0}, {&(0x7f0000000a40)="b695b2639ba417c272d8217c44064744fa8fad78c774ee4d47cd5367aeba716a26a1cd6edbd3febd9528804f4081dc00d1ddc716b2e42eea121e33820527d4026b4afcc81c2c2c0408e1c7dd46f852a6d63ec1f2d56c931ce313d26ee8a8dac3f39bf3cc266a7c27c9e04228aeb27696bcc3980ec9cd69affbdceec0281f219c8a927d96168ab12558e92fe273ae767989f0a40d8f6fadfdc94c6f8f1ff6e22dd0cfbf8048eae87c2c16f1985db6859ed6de902c276aa5f87ef00659e37faf65c5947966fc55ae5310097085e9659a46f1cf3400cf", 0xd5, 0x40}], 0x800, &(0x7f0000000c00)={[{@overriderock}], [{@func={'func', 0x3d, 'BPRM_CHECK'}}]}) fspick(r2, &(0x7f0000000c40)='mnt/encrypted_dir\x00', 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) accept4$unix(r0, &(0x7f0000000440), &(0x7f0000000040)=0x6e, 0x80800) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r5}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x35], 0x2d, [0x64, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x35, 0x63, 0x66]}}}]}}) mount(&(0x7f0000000300)=@md0, &(0x7f00000005c0)='mnt/encrypted_dir\x00', &(0x7f0000000600)='ramfs\x00', 0x20000, &(0x7f0000000700)='\x00') ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@local, r6}, 0x14) 18:54:24 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x410001, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') 18:54:24 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000000c0)='./file2\x00', 0x2, 0x5, &(0x7f0000000380)=[{&(0x7f00000001c0)="e8a1a3c13efe77777c13ca0c013e7a4458c74f47d80c910ebf34a00dbd73687b337f81f51daf50fb8bf8019f86c1b9b8c1f2e74d0a5119853d726bad233b6989b70c860d408bb56e0d21b5b85e3be1e1560e631ad463ef93a1dc39b4a2234826a6e1863068e14869cf79c6439941aa6a45b92b8fa46d126f4e3db00aa7483026022193a721a43998013002d0fd27c9a0020a0c491e7874d526ce301e614fd73b", 0xa0, 0x6}, {&(0x7f0000000100)="e48dc19a6015fdb15d35a03121db7fdf1792c490f8b1d2ea4f5cf797dec845b1", 0x20, 0x101}, {&(0x7f0000000280)="4169eabdf5b1cd429439cdfad887c4b79a30d676899871275b35d4b2a9a2b34c7e20807f61915a07dbb23b0f19b6ef43452cff70a0414aef232e12bf3c82", 0x3e, 0x7fffffff}, {&(0x7f0000000480)="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", 0x1000, 0x3}, {&(0x7f00000002c0)="9b6d144a67f7d4c1be884af38e0e40255523ab4af2b89a277bc116b47a7a32cb05acb8a1578d95d2f5bde6e4e046264497d5737b565c7e16e29dff3c326466a128212755b6cfffd71f9fe482b526bac715a2ef5ff4e8232cf2c6243ec542108dd6244ac608d91bf6230234fd331e6a0775522f1d4e6f3f4e94048898e2f6f0e27c7c16d9a090e0ed50b7389c52ab95fa5536d47cbcf9700256cb781cf2e007e8ba6bab902f182e115a91", 0xaa, 0x3f}], 0x18, &(0x7f0000001540)=ANY=[@ANYBLOB="6e6f626c6f6376667376312c6175746f5f64615f616c6c6f633d3078303030303030303030303030303830302c646973636172642c7379737667726f7570732c703030303030303030303032372c000000000000000000a90e15c08420cbd9c896412871cbd2118a4d8fce4144f9311ab00f5e13381db7fd377b76b56ffa175d000000000000000000"]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:54:24 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') [ 2998.122410] FAULT_INJECTION: forcing a failure. [ 2998.122410] name failslab, interval 1, probability 0, space 0, times 0 [ 2998.124093] CPU: 1 PID: 12331 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 2998.124875] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2998.125807] Call Trace: [ 2998.126127] dump_stack+0x107/0x167 [ 2998.126542] should_fail.cold+0x5/0xa [ 2998.126990] ? create_object.isra.0+0x3a/0xa20 [ 2998.127530] should_failslab+0x5/0x20 [ 2998.127973] kmem_cache_alloc+0x5b/0x310 [ 2998.128449] ? sidtab_sid2str_get+0x65/0x720 [ 2998.128976] create_object.isra.0+0x3a/0xa20 [ 2998.129486] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2998.130084] __kmalloc_track_caller+0x177/0x370 [ 2998.130634] ? sidtab_sid2str_get+0x17e/0x720 [ 2998.131167] kmemdup+0x23/0x50 [ 2998.131539] sidtab_sid2str_get+0x17e/0x720 [ 2998.132044] sidtab_entry_to_string+0x33/0x110 [ 2998.132576] security_sid_to_context_core+0x33c/0x5d0 [ 2998.133185] selinux_kernfs_init_security+0x239/0x4c0 [ 2998.133782] ? selinux_file_mprotect+0x610/0x610 [ 2998.134337] ? find_held_lock+0x2c/0x110 [ 2998.134813] ? __kernfs_new_node+0x2ad/0x860 [ 2998.135328] ? rwlock_bug.part.0+0x90/0x90 [ 2998.135823] security_kernfs_init_security+0x4e/0xb0 [ 2998.136414] __kernfs_new_node+0x531/0x860 [ 2998.136910] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2998.137464] ? cpumask_next+0x1f/0x30 [ 2998.137908] ? kmemleak_alloc_percpu+0xaf/0x100 [ 2998.138454] ? pcpu_alloc+0x12a/0x1240 [ 2998.138912] kernfs_new_node+0x18d/0x250 [ 2998.139390] kernfs_create_dir_ns+0x49/0x160 [ 2998.139912] cgroup_mkdir+0x315/0xf50 [ 2998.140360] ? cgroup_destroy_locked+0x710/0x710 [ 2998.140912] kernfs_iop_mkdir+0x14d/0x1e0 [ 2998.141393] vfs_mkdir+0x493/0x750 [ 2998.141809] do_mkdirat+0x150/0x2b0 [ 2998.142242] ? user_path_create+0xf0/0xf0 [ 2998.142723] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2998.143334] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2998.143928] do_syscall_64+0x33/0x40 [ 2998.144358] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2998.144952] RIP: 0033:0x7f371d026b19 [ 2998.145383] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2998.147523] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2998.148402] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 2998.149229] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 2998.150058] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2998.150898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2998.151723] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 18:54:24 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x2000000000) 18:54:24 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="01010000000000003d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=r3, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d1fb27-7ab5-2c03-5304-afcb01cf,\x00']) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:54:24 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x81, 0x111002) openat(r1, &(0x7f0000000100)='./file0\x00', 0x480000, 0x1) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) rename(&(0x7f0000000140)='\x00', &(0x7f0000000180)='./file0\x00') 18:54:24 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2998.233101] loop7: detected capacity change from 0 to 135266304 [ 2998.253735] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2998.261767] tmpfs: Unknown parameter '' 18:54:36 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x2100000000) 18:54:36 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x24) r1 = open_tree(r0, &(0x7f0000000100)='./file0\x00', 0x100) openat(r1, &(0x7f0000000140)='./file0\x00', 0x24440, 0xae) open(&(0x7f0000000180)='./file0\x00', 0x141000, 0x33) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x501000, 0x4e) 18:54:36 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000600)={0x2, 0xaf, &(0x7f0000000740)="66de19bec448a1774b69aabff8aa66658a0406209dac1fe8eaad84f6bbe6652f70af6614c4ebf76434f396c7e228760248646aa63b058e4d2fb3bac798dd76cd9ef59de0fd49642943a9a0a7c71e0fb849a7ede36b90c2f923d26c57db1604bda082585188cbed9e676d785dcde78aa635e4f4670875b365bcce3a4ecf11134802254b7f394a23a698c90daa71b62bfd52175b2114f0f6d5f2c6f435dcd667b79385ed90575f1d0b4238bc8a223e72"}) lstat(&(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) getpeername$unix(r1, &(0x7f0000000400), &(0x7f0000000280)=0x6e) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r5}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'lo\x00'}) openat(r0, &(0x7f0000000480)='./mnt\x00', 0x102, 0xb64859c81d37a1f8) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:54:36 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000700)=ANY=[@ANYBLOB="7472766f3d48a339744f8b970ebd79ac32ad562660db05f8a644ee0d7e9f5f39e3c4b43acbd4e4ae7fca1ced7488dfc98c7fdc12233027da5fd2ec000000000000000027db4bcaef8c76647fdad6a2735e56e862ce47cfe1ac1204c9feb20b79e01c14629695f9da699f9e97d4bd0ec4871a2c94e546a9bfc99948d0e774", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',dfltuid=', @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=r3, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d1fb27-7ab5-2c03-5304-afcb01cf,\x00']) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r4}, 0x14) 18:54:36 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x8000, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') 18:54:36 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') 18:54:36 executing program 7: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000480)={0x3a0, 0x0, 0x608, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r0}, @val={0xc, 0x99, {0x40, 0x3a}}}}, [@NL80211_ATTR_REKEY_DATA={0x24, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="c6069b0badc10d4a346433df4d9d1450"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "b85a5c1b3f5ef78b"}]}, @NL80211_ATTR_REKEY_DATA={0x58, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x15}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x80000000}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x9}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="1e7083ef8198f7e9600c5867dbb94c5c37b1a5f9b5fd6ac1"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "c55416d0b3bb49b3"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b5f67520d9fc140b726b3e6638421257"}]}, @NL80211_ATTR_REKEY_DATA={0x88, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "09475503ded8cfb9"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "8896d25efcf23bfe"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xe2f7}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "abcfc2f511fda5d3"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="00c5c2ff9193c3b72d02991552b57e88c6dab69c90af85b7330a284b4028320a"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1a303cd9}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x49e}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="1c3b983194fb6d0cfa43c11685668b09018fc9fde877ab8b"}]}, @NL80211_ATTR_REKEY_DATA={0x70, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5ada3b92aff3396c"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="03181c26747e9da5ee2a7c9f9cf29731"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3ff}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="18fca90a7eca3af347498eaa12817968"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "ca9991dc18f09b15"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="327ee70fdc5cc1bc33fa29c881c36423a1a897d1dd972c50a4a1ca6dfeb5e545"}]}, @NL80211_ATTR_REKEY_DATA={0x70, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="847d582e689912e5e44353a6c9d6350bdcea72056f10def0f1e884317a46c41a"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="fb47321e71537257a0a055a34dbb24bc794c912dca0bb46ca14dc7a54fa46753"}, @NL80211_REKEY_DATA_AKM={0x8}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "1d22c4ce8bafdf73"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x5}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1}]}, @NL80211_ATTR_REKEY_DATA={0x4}, @NL80211_ATTR_REKEY_DATA={0x40, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="57fec5ee2dd892ccd5e0483c32cf724f"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "78d705448ec5b487"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="3ccc96c58eed3932e45be183d5a9ad13"}, @NL80211_REKEY_DATA_AKM={0x8}]}, @NL80211_ATTR_REKEY_DATA={0x7c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="596bfcd0fb5c69ca990298478cfb42875790b21774123cc7"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "227cc1bf6b23717b"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "f69e57c8d8bfd5d2"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1ff}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="5004ec9adab9747fc5eb417e4729d93d"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="eef468b8ce89c0a6427de4edd417ec002279885c6694de39"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "df5d533e16dc74d4"}]}, @NL80211_ATTR_REKEY_DATA={0x6c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "5f6e8bcf7ce28d14"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1}, @NL80211_REKEY_DATA_AKM={0x8}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="aa97fd9549b0ad867db1cef7f00e87b1"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x10001}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "90b131245517dd4e"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="a46a77675366f9dbd1c803d28931fa4969c26d8dd6387610"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2}]}, @NL80211_ATTR_REKEY_DATA={0x68, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="4da569f32462596193c88b4aa51869fcd62e57059f8fdb647a5c08542ad2dc40"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x5}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="6147a3f9c919534cf88134c68a615c94"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="6652c9fc7aa8c14d8e7ff7b29cb0b318"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x100000}]}]}, 0x3a0}, 0x1, 0x0, 0x0, 0x20004010}, 0xc080) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) 18:54:36 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 24) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:54:36 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0xa, &(0x7f00000016c0)=[{&(0x7f00000001c0)="c86cff3a4a516d6c27d20fdf9803a57a28fe6e62af44ba8acf08826f144bd43a79a6a866c1844d7339a11d71f7ede1c157915392f4a6425dfe426a57b665c47c2b672f2dbae70a2b9f04df64064f5ca4d8d9c27feb35646b5aada0902a8ade599dd95d84878c36820c9f908e33dd1e83d592038fd5b93c0eb6289e1ab9c01572f4102a86383b8285470cec65526de87c7f381b62371226b5e6955041c1bbc7916beda4d4098b2542b08183f3e6ec4d0a7dc6dc384230852451fa2af2bf2d75d8dbdc3e5779b5aa965ae2ee341610", 0xce, 0x9}, {&(0x7f0000000100)="d05204f50a27919af82a688b4c1401d92d71b4e312d991c3a62e956af9b2abb1ad028fc9e8b279833b9d8e5bfc701f", 0x2f, 0x4}, {&(0x7f0000000480)="c2cc2e12ff2a2f00dd746a6b8e1bdc1d79bef656e39105724217139796546c20ee8ef4207299e83177e2a31162dd3c7380d280cd1a1d1381db4435011f01acdcaf5c2c8d9026c264c4776a9491a950d2d75515d60d4b963861d222a1184786a9c195c88a0a2f2d8b8fa8dda413d0f2e79dfc5b7752e47afc7bf6291f35e988f0a2ed42f10fbb5ed297140f74f895ee0e2d14b2916940393624ee109ffd752e83a950a8086cfa5e12062e6b1eeecdfa269b5de2c27b6283656b14a7aae22ca625fdcfff3d2921de3fd12ceb3e2ced9c53e5285e72c6ead9ce59007bc9d438bb9488ed2e931caff68b06248396663c93706e4e1b0c805f66745a6dff3b82877b85632c9baa555b366ca277764d3f877aa4f5793b4f416dcca182bfc51253a6d32a611f883b2ea000104fb0de5cceb672af0031e3e0d2fb6b5c2d573d77905ecc6fc129f723fb017b6b6b89d6855944d878e947d3fa56fd26fcaf16e5d7bb63b8306bdafb8ffe0bbaf8e7a58cac7121caf6bd0c690204b0d7944c13f650deb5ed64df8bdd1ccee4380cf12138871e7754dfa707b1bf1c76eb8c8c7e1e3b13fc7552157c70576a4203b82159527cfaab15bfad332e01a64657e3999364ed2a8e5e895a797b65970e65123b2551b5610acac1debde472323a4b64780cae708639d901a55210dbf1ff053b066b2631b06989fd5644b5c0fe0a54cb95914ac647e7bf86565a9b268a463b9fb68bf2238d7db16e4490a27485319a8de557220da72275afbb06f8822f46ad78d05211c9075dcd65c55949f0c67bb401e97d21923fe0900472a65f784accad170eda5acd40791145f3fcc7867ef7729a6a98b44cc285809a44175ad22586fd0370198173f3988132ee6131df21037efd0ffb3d2301dd42b884b22ddc9cede24f77f025582d1a296e375f58f839e265135126235888ca54033bd39541e6dfdbaf03f713afe464cf4ca82a527da2007b648a43fb6bc38054d65575be3830d3d1e78b763878bd1d76fc85b5f0ce4a120be0096445879ee9fb6dae21aff42e900ce2798880a7057447061558e37a1c2a352a29160b24a6deec324dfe4c22ba5d1c5bf900b03894410d5be3381c17880eaca7b45d36d44f33a2ae3d44cecc9564716bb9d0964ffa43765bd71a78be6c091406794c1ce501c3f25652f3ed66a0bc07bb266c1488ced351ff528eb3dfd8b14008840d15dd54bbfe74728fa61ce2b4641412e1e6f4d43d29761480679b40f22780c2362bd51ac6c2e251769c607f2113ceaded570bda738d42ea6793ffd7084a0fa6b467b5b7fa8aea972f8353f9b54dd19c27ac7c9c60433d4b0eceeb3e0cdb8ac6e9cfcf139d943a27a3ba50895cf8630a17f06d8d8d7612e3bf78c3e808681efa82c7172dab81558763d2bfb3821ffc0241ec63fff2c9a2755fe0cb6b191c996197c394a47bc75d8285af4dbc1fe256837c9205cfbb9e99667c00f2681240b6ef5eeedbc7f3cb68d45f9eb425ed20e7cc051297df1af4816c22b60006e0c9e97868411d88d3451bade8f56abe72451a719f7dcc4e8ac0489a08b3eb70f4879c4c71335b708e59a759eeb43e261351f6937731a25a062a430515032c4e7c424a6c34ee8e1649ede57c0c0296e1ed6af8d3d4003232e82b873c9a6662db3423fc4bcf8097ec6b7700e949e0decb851f58e90181a72fc83f7de65eb5014b6b4fb86a51746f011cfb8755a5e1f4723c0f4ca3475cc26794d0839b5882db540859075e473bf14acf46fbc5109b15b0cb57df0e1fdaf4325719b9b5e05b0ba119967023259a752e53f605760aa1c7ab46c91f907447a8f873c86f87d403524d38846d9a7fe756862492f30f24b431c63af9cc2d27d7abf83def501dc52de9c630ce294c128db181da87a2a21b16e59012c34271f90f4791d0da5a7491621294f39c6f317dc423ab3bbd0e47e72a6e498d50819dfcaac79d7eea3de076053c4cd2bb0654ca4c80d6fcb56888d4e19890bfe8fc1b0383e8d28ca5c4fff5cb6e9ff6f4e444efba02f6243f7e7b2901071fe2ef4a6960574f6a3e6aca8e9c29b88f0b8ea465ffded6632e3db20d8d7b97b5b0806199504548ac2b920f08bd4121e699bdd283cf1d7788297721f938b902fd67d607f5b5531564d8113163580f731dfadafe9475d591eebc41b0e8383455c1efea3297cfa136d67291411444f6e0d387d08f085f435a468daeef1341258dae459b8e858aec74e4fd3675b388e79d392e58f34ff43f05577a9277b3ef85e16be62dd06b38768ca44b7cfd0283e781feacab24da358db3c2592d5ce023df1e31774a20ebc48394df49d4238a48da92808a443fe08bd871ba68e6be9c7f2b2a2a6dba880b67612b9bca7e218a3fd4e77959a961645c200cbc17a853acf55f89e1e4116683c2bb088db66dd9862f1571fba77f3bbb9cbcc7ddc4e5c4b943da4fcce102221b96a239dc8e7242c810bac913f7faec9688de5c929a100f1c0a53220f519290a784014f60b4b1b3bc609b9436206422d6754c4080dcd9fa7a4336dbf83d52c4ff161d045a2e3a270f9d3a80c010a755840b3fa252d1fae7e7f539681de3d373d76521abef16104a48961d7995084df9d5c07b37432bf8fb854e9d9868900d66132ae9715c703348580ffb27fa015650f505aea5df9a50f307a34a92c7c8cc3c9921dd86278ac9b431e3762c57b6e5e4a0d21b09b8713de4473f79a0cd79577167b737d1aeaab90384ca68f25bf996079a9919e306226d203ca02464fa3c9c1a5a74a3b2dc96711de40e08f47d7d5443e348e666434ac5b5c1b09d5eff4b281d3865645946c801c63abe7f272287e757ec6717783592f6fa16a9a94a89fcf315ef1970b0e9375e1004e779f3190335d77f6187f8749f322cdcbd67ba77256acd832ec4b77eeba76897a4fbc6e787e1b8c4deec813397e147b58a34ef30417141a5c954eccee5e102a428171f02dab55742f4ddaad466370a8201981ae06b0f42af29d6e010555c5b5495c1bb92438ea2dce8bcd82e9d211c818c64bc16e534ed20973b841771dc6538fd841e199757d59cdd7c2314d57adcf656702572f2446a6f8c47ff07efe6f06c2fdcb2ce256da666a6bc8f4b41226cf309abd4d888ca023f1025bd2f831f70a423222311a6617650e828660b09f35140c32d396bc79e3f0766dcc5b0186e50fd9b431ee9438b09a911d71fc22c869e4666e9aa94dc0ff3bf4e93b243b4b38039eb9122a4325d587110262dc7928a0b0664715ad82a69b9993b6914afe179b95cf12f6361f761266a3ff6a27b64af60ab72f3c8a8eaa9fc4f6618c90fa5d9a9586f5448e72a2d08c98326e686dff4fd0cf84b2770946a5cdb44443d5e861af46a1d96cf3a458ee6b7fc6957bcea50d69f8b71baf8e5088eb8faed160669c531b9bb0c25cdbe3ab8f95f3a8e551158c45a7166a101ed0b2f3bbe886b3a2420c27313cf052dbfeb1a2bebc48b2a00eb6c3f09c74542dc8c80d04f1818ff7f8a7a7bee31a6d62ed9c008edb5055880762714efb6e9ebdee3fa972e6f4ff0d4be2535b7f084f050ac3e1223709436edfcb68f763c109840b5f2c0e0e285c97b2f0b68af5845a42be3a98cd83299d5b1d4f0215d508c5e414db8cc15c302c439af6f1a0e58efd82c6e4d0180a1ad5f74963a6afa502faf8a149a8bce983c6a7d2aea1e2b99164f8f41956467df4e5b069ff05301badd44db401d213a34101ee5eff9e585eb652ba66be9bd633cb8dd91b2f6b2d2d80ef4a51311147cb3e7426352e77a9b515841d99ecc6da47b21ade8b17bbbedab3c663f00df824d4c08733713fdec7290687bb7444e2418685dd2712ea2c40b2db0713d019a4302cbd5e1865b3f0100c55a88d17e68698c2846b6219b0b07e0ab478b0a1cfa574372cd7634e5ae25980dcf8143b37fd7135283256bb1b47ba6dc637734bb1ccb592277831cde68e56c280a3605e71c997d702dc6ece82315148331ce6e2d23bab196611cf521791444806133bfb79da0f47bce0bb78bf0334848c3b7766b76b3dd4552c6cdc593d6ad183a733a93bdab62ee5a68f11c715008d62ef35e8301e3f71923020e87d9dbe5235f10a234b12e4868fba2a8f0f65d57e0c490945f05242777eb9a564b0fe8e1363a0556cb7d500a1e2f4bf1c3fe596e63fa42ead5ee33856e8bc6879209ea103693679347ca63a934d2e768351ff5389a01fce61320936856c7e3ed6699c05bda68f60024b997ac5988bf315dfbca72bbbd409160376256a32eaf7c5255c713057806c5c3155a91d2c7decff8401f8b390fbc8d72ee3d607f8ca7452d24c84bac0a23624fe60790e54c776f891d72adb16be7c286b76cb19670ad5066641146ba5960a72e351170b6eee1921c3668ca2e6b3f16ba4fcb10446ca3cadcc0a723cc381463b57d9924717b40c283540912beb07b292d549e8de8b7d598fc8420a94d7a59d7080fd91590efd5d6ffa9362b7182a05d5b01c7f14a2c3552180a04b546b9f0fee26085c6d5d7603191b5093911e5c519f0574ce94688ac76dbe22af385b2898480395512d3ca916677e50aa4ed7b6ea7b1690598b953b7d7611aa5e19dc5a768cfd183cf21335996e4186c9969cf0d091138354a949bec1119d8961ccbfd96df5dcddbde77501760f70e4272506bb707a54563a69a46fff1cce5b2b0f3b5c601db9706a6bd52fed6e8f230f5fc1e4725fd92e8d365c6d3d3ae8a1e37083a3c662aef4494f84d91495c6d44bd8d45647ca18679833d2d23c64041ce7699b0aff39691621d9369d7557e58678387436dcf8080d7bb9bf5981e2b69c0321df4b66245c6d20ebbafa4bebb1199a3da1be886fbc2c16f76ace4f75013edb78da44158fbfcf542c056e4c0424b524d79fd2f5c74953dca199ba525c468632174842059d79cba3a43af7ac8e72cea002178110c8564316f36d5d9194053ca2e04fe1da259dfb16d945cfca7cebe7286a52d5a066df4f9fbbbbb8aa4a5ccfaa2d46e25d98762435379df8db0107347fa170ee86ccd90534a693ed7a96ae21e7905b8feffd109ee987882ae3411c21d4cb1f09bda216eff5d6da03f646fa84d0b5ef21e6cde943f425b24f731ce79fdd9f449cb9c9d8d46e7c3a7c9e49e23814936940b2792fc174b4b1bfd1c0660cd0885563d22e1d3f1e2a93aae057a46a4138daaa6bcb68710bc081364213c9e17729d04b73c1ab278687e69000b22cd5753fd3bc317bc0c33785e583e002db8dd1b23cdbbfca7c60c3aaf6320c181e96f1f858d61e5da0db9af46595e297ace7a22d2efad4dae7529a2f21948764d07d5387b7a4f1a1c5f79c15e0bacd8c2767f3cb0a45b79a320d0fb99c9ae14b2d274b83f952b3c66f3bbcfd21cec1c59ae060b8799881630d34b8adc265569923a66ccada09368a623a32714fba54f8f74870cf4745faf68d6a1a8eb305a0f4fb7a3bb1259586baba53e2090c636237ddb42b6da6cfc2fa413dfd3dd473611096596c9d78b28296a796bbe38da08c1f3e196d2b4ed9bb16df6a2b2914b0dc901b910c0be4b5719b9e87aaf35a71196f8aa3ca031d5cfa44e9e5a7583dce613ac5ad51fadd96be12b5f4670b510b25c79668be59962b7649d359070a5811f7f42fb2f77cbd2c0518d0ae49fa386b99e19e86df663f25ce165b2c855a5df788a923b0197178852f3148084e55296d70388e7abb05364014bddddcff06d4302fcebaf2e0ce1f2fd5675996390517e89f05f0520edb56ef2a0d1a4bed46b7842b184bdd07b90a7f260b2ea0e8e3957ef3c957d", 0x1000, 0x1}, {&(0x7f00000002c0)="d793dafded14e5a35aa38b0a1217b98f19433504e7d828cec13d48e86c60c660a5a0fadb1a6adcf0777d162500458391e86759b36bf74684505fadd7bff8f6babec3d5fc108472a3125a9c8ab3ed6dba5b8f1b34407f1e8c1f06c2b15a257987b845e74f750c813f45b59b934f41ae398ee0b69a7b0db58daa34ca687976086e72460a187ff55180faafc17aa5894a61b581dc8ba29d25df0f04b4cd09f4a2257fec8eda528c33e5bdfcfaa00aae1269766ed1680a01b428a9ad9e9ccec56ca58ce8034e52a2fad1e03ba8eb", 0xcc, 0x5}, {&(0x7f00000003c0)="49ac432fb5c8cb51da9deea41d81d412f4723f0bdace25a57a1754cdad8b53042ec9a1bc7ffedfa36a3ef4a0d5", 0x2d, 0x6}, {&(0x7f0000000400)="446ab5b60395d9c9784698f1e5a9c5d75c22975330668bbada5f15ddfeb2fc8afa43797cde14a8c7ba1b747316c837c48bf78305afae177657dd724480", 0x3d, 0x400}, {&(0x7f0000001480)="279e195de5d7d0a25f14e72b1e4e10ea6355435b047b4b8e50ced530da181c09c5d11ec6d8d6ae8699895c81fc90078f7fe6c11961befdd08c161b24730b5690a2e181da307fe42141e83216cc64af1656f64003671327996c9fdff0d0c2ff2422ad8b9f2f2236ebe984", 0x6a, 0xfffffffffffffff7}, {&(0x7f0000001500)="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", 0xfd, 0x5}, {&(0x7f0000001600)="97426c28ca94bdf17e121ee88b927a866dba04ab5843c931d4ef0f1e6212f6161e08522f16101d417a94eddcce75c50c9e4b8d0c9630990da1193d14fc9b90fcca26e1f616f042659347e96230ee484903e55b7cdda51f33c5f029d696095d10313a7a56376098061f96c238c6fd747fb378175c7952dc091535d1da8228", 0x7e, 0x7}, {&(0x7f0000001680)="b5c0ab463f9e6205bf7c1ea98d15f8ba62ffdd52a142e4a6ee67142d69ad89d4be7276f7a4c5fc3a0f", 0x29, 0x80}], 0x1000c04, &(0x7f00000017c0)={[{'\\[+'}, {'%)]:%@${:)\xcf}%'}, {']:+^,'}], [{@fsuuid={'fsuuid', 0x3d, {[0x30, 0x36, 0x64, 0x64, 0x39, 0x62, 0x34, 0x34], 0x2d, [0x64, 0x64, 0x64, 0x38], 0x2d, [0x3c, 0x32, 0x0, 0x31], 0x2d, [0x6e, 0x66, 0x38, 0x66], 0x2d, [0x31, 0x30, 0x61, 0x37, 0x39, 0x64, 0x31, 0x64]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '*'}}]}) openat(r2, &(0x7f0000001840)='./file1\x00', 0x2000, 0x0) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') [ 3010.417465] FAULT_INJECTION: forcing a failure. [ 3010.417465] name failslab, interval 1, probability 0, space 0, times 0 [ 3010.419984] CPU: 1 PID: 12385 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 3010.421432] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3010.423176] Call Trace: [ 3010.423748] dump_stack+0x107/0x167 [ 3010.424510] should_fail.cold+0x5/0xa [ 3010.425304] ? selinux_kernfs_init_security+0x137/0x4c0 [ 3010.426422] should_failslab+0x5/0x20 [ 3010.427216] __kmalloc+0x72/0x390 [ 3010.427958] selinux_kernfs_init_security+0x137/0x4c0 [ 3010.429039] ? selinux_file_mprotect+0x610/0x610 [ 3010.430012] ? find_held_lock+0x2c/0x110 [ 3010.430871] ? __kernfs_new_node+0x2ad/0x860 [ 3010.431791] ? lock_downgrade+0x6d0/0x6d0 [ 3010.432655] ? rwlock_bug.part.0+0x90/0x90 [ 3010.433531] security_kernfs_init_security+0x4e/0xb0 [ 3010.434608] __kernfs_new_node+0x531/0x860 [ 3010.435488] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3010.436463] ? cpumask_next+0x1f/0x30 [ 3010.437261] ? kmemleak_alloc_percpu+0xaf/0x100 [ 3010.438241] ? pcpu_alloc+0x12a/0x1240 [ 3010.439070] kernfs_new_node+0x18d/0x250 [ 3010.439909] kernfs_create_dir_ns+0x49/0x160 [ 3010.440822] cgroup_mkdir+0x315/0xf50 [ 3010.441612] ? cgroup_destroy_locked+0x710/0x710 [ 3010.442604] kernfs_iop_mkdir+0x14d/0x1e0 [ 3010.443464] vfs_mkdir+0x493/0x750 [ 3010.444210] do_mkdirat+0x150/0x2b0 [ 3010.444958] ? user_path_create+0xf0/0xf0 [ 3010.445825] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3010.446885] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3010.447886] do_syscall_64+0x33/0x40 [ 3010.448610] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3010.449601] RIP: 0033:0x7f371d026b19 [ 3010.450328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3010.453917] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3010.454448] tmpfs: Unknown parameter '' [ 3010.455407] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 3010.457908] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3010.459307] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3010.460700] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3010.462081] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 18:54:36 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) accept$unix(r1, &(0x7f0000000100), &(0x7f0000000180)=0x6e) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, {0x1, 0x8}}, './file0\x00'}) pread64(r0, &(0x7f00000001c0)=""/203, 0xcb, 0x2) 18:54:36 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') 18:54:36 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x60ffffffffff) 18:54:36 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c0004002000210c000000e400000000020100000000af0180000000"], 0x1c}}, 0x0) getdents(r1, &(0x7f00000002c0)=""/26, 0x1a) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0/file0\x00', 0x1210c0, 0x40) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='pstore\x00', 0x40815, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x400802, 0x28) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') open(&(0x7f00000000c0)='./file0/file0\x00', 0x20040, 0x5) [ 3010.532858] loop7: detected capacity change from 0 to 8388096 [ 3010.534510] nfs4: Unknown parameter '\[+' 18:54:36 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r5}, 0x14) 18:54:36 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x20, r4, 0x1, 0x0, 0x0, {0x16}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0x20}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000740)={0x24c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x4}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1b8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x9d, 0x4, "af3a06fc2c68f6a544a3184b8dfc0b9d26eb1bf3c8cebc98de6594a728d17c156c4c84e1c750359e5b33af4a82d071bac658124366b3d61c4401816cecd0bce7198b2a4e38961e15a8ddac8f10dbb5ce58df6e4f77853844999277b7b5d9576528159334b616964276df2085ed2e61937993e588060524059a8dc8a3e8837facd5414535446e7e4cc77c13f77b9f1807cfc6264993f6970fd0"}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7fff}, @ETHTOOL_A_BITSET_MASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x24c}, 0x1, 0x0, 0x0, 0x80}, 0x48045) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:54:36 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x15) renameat2(r1, &(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x5) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:54:36 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 25) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:54:36 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') [ 3010.753141] FAULT_INJECTION: forcing a failure. [ 3010.753141] name failslab, interval 1, probability 0, space 0, times 0 [ 3010.754843] CPU: 1 PID: 12417 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 3010.755753] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3010.756871] Call Trace: [ 3010.757229] dump_stack+0x107/0x167 [ 3010.757700] should_fail.cold+0x5/0xa [ 3010.758202] ? selinux_kernfs_init_security+0x137/0x4c0 [ 3010.758899] should_failslab+0x5/0x20 [ 3010.759400] __kmalloc+0x72/0x390 [ 3010.759853] selinux_kernfs_init_security+0x137/0x4c0 [ 3010.760517] ? selinux_file_mprotect+0x610/0x610 [ 3010.761136] ? find_held_lock+0x2c/0x110 [ 3010.761673] ? __kernfs_new_node+0x2ad/0x860 [ 3010.762237] ? lock_downgrade+0x6d0/0x6d0 [ 3010.762786] ? rwlock_bug.part.0+0x90/0x90 [ 3010.763337] security_kernfs_init_security+0x4e/0xb0 [ 3010.763994] __kernfs_new_node+0x531/0x860 [ 3010.764541] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3010.765157] ? cpumask_next+0x1f/0x30 [ 3010.765650] ? kmemleak_alloc_percpu+0xaf/0x100 [ 3010.766250] ? pcpu_alloc+0x12a/0x1240 [ 3010.766771] kernfs_new_node+0x18d/0x250 [ 3010.767298] kernfs_create_dir_ns+0x49/0x160 [ 3010.767870] cgroup_mkdir+0x315/0xf50 [ 3010.768363] ? cgroup_destroy_locked+0x710/0x710 [ 3010.768973] kernfs_iop_mkdir+0x14d/0x1e0 [ 3010.769511] vfs_mkdir+0x493/0x750 [ 3010.769967] do_mkdirat+0x150/0x2b0 [ 3010.770440] ? user_path_create+0xf0/0xf0 [ 3010.770984] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3010.771656] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3010.772314] do_syscall_64+0x33/0x40 [ 3010.772791] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3010.773449] RIP: 0033:0x7f371d026b19 [ 3010.773925] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3010.776295] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3010.777268] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 3010.778176] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3010.779105] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3010.780016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3010.780922] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 [ 3010.805603] tmpfs: Unknown parameter '' 18:54:50 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 26) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:54:50 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00') 18:54:50 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = creat(&(0x7f0000000040)='./file1\x00', 0x10) mkdirat(r3, &(0x7f0000000280)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f0000000300)={{0x1, 0x1, 0x18, r3, {0x55848000}}, './file0\x00'}) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:54:50 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001880), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x44, r2, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast1}, @NLBL_UNLABEL_A_IPV4ADDR={0x5, 0x4, @private}, @NLBL_UNLABEL_A_SECCTX={0x1f, 0x7, 'system_u:object_r:var_t:s0\x00'}]}, 0x44}, 0x1, 0x500000000000000}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x9c, r2, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_virt_wifi\x00'}, @NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:tty_device_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private2}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:mount_tmp_t:s0\x00'}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4000054}, 0x40040c4) sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r2, 0x60c4ee054cc69804, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'vcan0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x30bac0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r5) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r6, 0x200, 0x70bd2d, 0x80, {{}, {@val={0x8, 0x3, r7}, @void}}}, 0x1c}}, 0x4) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r4, &(0x7f0000000400)={&(0x7f0000000240), 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x20, r6, 0x700, 0x70bd27, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0xcbde, 0x2c}}}}, ["", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x4040000) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r8, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') syz_genetlink_get_family_id$ieee802154(&(0x7f0000000600), r1) 18:54:50 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x81, 0x7, &(0x7f0000000440)=[{&(0x7f0000000140)="3907f54cc0e6cb", 0x7, 0x7}, {&(0x7f0000000180)="b6f750667a03b6a8f8177bba7be60297a2798ff35b687c43471036304cf8a18ffebe7b88fd4fd4f0a6cab214ae726b014995036f39433edb8c08a695d1ffc1d0bbad40f5e0cf84a99ceef3", 0x4b, 0x4}, {&(0x7f0000000200)="5d66731873f0192599fb789a555415504f65694e384e70fefe58fe1e2b41699be88d10963ddd7df44eef5f3729a192954ba71209b7adbd8b3b74dce2ede45ca12facbed6fe4fa1af055152edac5ec448738a2f1256ca0b90a4b16cd29388517ea635d82fc2b803dcaf452698c1c407942195a54af04f6ec63c7ef744", 0x7c, 0x3}, {&(0x7f0000000280), 0x0, 0x3f}, {&(0x7f00000002c0)="28bdc8759c09eafeeb7b465f65b42665cc1dbf2bea916f6ec330cb51606796af972e51fec0b8040c5c6a2c568c4478d5709ff1e5cacf2f04516bf683", 0x3c, 0x1000}, {&(0x7f0000000300)="99a486da44fe4c62679ff0352225286fb45e02653f87139385a90da4ba40179b6b544410a8b52a3ed7d3539a4c1cb14d231c09029ccc56933ccf809b3eba8e16409d71c7bda56b665b652575add2762141e4ed6d735febfb742f9f6f3bf53ed150136974572a61b63fa078a128e629c58c9deb1a00ea2a429b21", 0x7a, 0x1000}, {&(0x7f0000000380)="c166ef09b277370c2039e8488d959bb270dd132aac2aef5c146c229d5e429f861ad1038be53096142022105914d2ad7b9143e18f57604a75ff88b8b7355aebc52f12da5b99c3bb44bc81f2b062bd644efea82ac5108de8d149d5f2883df02d7bce5d797dabdc6c3306c1f0320075314dae74950b5bead72215917c11e736ad1bd4a42c24095ea903187158794633a01d3f657656709d1bb2c0a5", 0x9a, 0x1}], 0x212b091, &(0x7f0000000500)={[{@dioread_nolock}, {@resgid}, {@max_batch_time={'max_batch_time', 0x3d, 0x9}}, {@noblock_validity}, {@noquota}], [{@appraise}, {@euid_eq}, {@subj_role={'subj_role', 0x3d, ',$%!\\@\v{}%)})\xef,'}}, {@seclabel}]}) r2 = syz_open_dev$vcsu(&(0x7f0000000600), 0xa4e, 0x0) renameat2(r1, &(0x7f00000005c0)='./file0\x00', r2, &(0x7f0000000640)='./file0\x00', 0x2) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:54:50 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x7fcccedc2000) 18:54:50 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./mnt\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="0d05895e050000643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=r3, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d1fb27-7ab5-2c03-5304-afcb01cf,\x00']) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r4}, 0x14) 18:54:50 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') [ 3024.551322] loop6: detected capacity change from 0 to 8192 [ 3024.584046] FAULT_INJECTION: forcing a failure. [ 3024.584046] name failslab, interval 1, probability 0, space 0, times 0 [ 3024.587262] CPU: 0 PID: 12441 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 3024.589085] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3024.591244] Call Trace: [ 3024.591929] dump_stack+0x107/0x167 [ 3024.592877] should_fail.cold+0x5/0xa [ 3024.593862] ? create_object.isra.0+0x3a/0xa20 [ 3024.595068] should_failslab+0x5/0x20 [ 3024.596072] kmem_cache_alloc+0x5b/0x310 [ 3024.597123] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3024.598383] create_object.isra.0+0x3a/0xa20 [ 3024.599528] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3024.600916] __kmalloc+0x16e/0x390 [ 3024.601857] selinux_kernfs_init_security+0x137/0x4c0 [ 3024.603204] ? selinux_file_mprotect+0x610/0x610 [ 3024.604391] ? find_held_lock+0x2c/0x110 [ 3024.605288] ? __kernfs_new_node+0x2ad/0x860 [ 3024.606250] ? lock_downgrade+0x6d0/0x6d0 [ 3024.607353] ? rwlock_bug.part.0+0x90/0x90 [ 3024.608363] security_kernfs_init_security+0x4e/0xb0 [ 3024.609456] __kernfs_new_node+0x531/0x860 [ 3024.610424] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3024.611536] ? cpumask_next+0x1f/0x30 [ 3024.612412] ? kmemleak_alloc_percpu+0xaf/0x100 [ 3024.613516] ? pcpu_alloc+0x12a/0x1240 [ 3024.614387] kernfs_new_node+0x18d/0x250 [ 3024.615275] kernfs_create_dir_ns+0x49/0x160 [ 3024.616268] cgroup_mkdir+0x315/0xf50 [ 3024.617159] ? cgroup_destroy_locked+0x710/0x710 [ 3024.618206] kernfs_iop_mkdir+0x14d/0x1e0 [ 3024.619145] vfs_mkdir+0x493/0x750 [ 3024.619971] do_mkdirat+0x150/0x2b0 [ 3024.620806] ? user_path_create+0xf0/0xf0 [ 3024.621718] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3024.622921] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3024.624084] do_syscall_64+0x33/0x40 [ 3024.624939] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3024.625391] tmpfs: Unknown parameter '' [ 3024.626068] RIP: 0033:0x7f371d026b19 [ 3024.626090] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3024.626112] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3024.633718] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 3024.635342] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3024.636922] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3024.638501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3024.640058] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 18:54:50 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='./file1\x00') stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) utime(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x7, 0xcf}) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:54:50 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x7fcccefc2000) 18:54:50 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(0x0, &(0x7f0000000080)='./file1\x00') 18:54:51 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r0}}, './file0\x00'}) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x105) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:54:51 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', 0x80082, 0x140) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:54:51 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 27) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:54:51 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x10e) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="6800000000240001801400018008000100ffffffff08000200e00000010c000280050001000025fdec53000000240002800c00028005000100000000001400663e3ceca40180f3ff00000014140008000200e0000001080007400000000004000680000000000000fdff00000000000000"], 0x68}}, 0x0) lseek(r1, 0x6, 0x2) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEV(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x800, 0x70bd25, 0x25dfdbff, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4001010) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') [ 3024.842118] FAULT_INJECTION: forcing a failure. [ 3024.842118] name failslab, interval 1, probability 0, space 0, times 0 [ 3024.844302] CPU: 1 PID: 12466 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 3024.845486] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3024.846914] Call Trace: [ 3024.847385] dump_stack+0x107/0x167 [ 3024.848007] should_fail.cold+0x5/0xa [ 3024.848664] should_failslab+0x5/0x20 [ 3024.849319] __kmalloc_track_caller+0x79/0x370 [ 3024.850096] ? security_context_to_sid_core+0xb4/0x890 [ 3024.850987] kmemdup_nul+0x2d/0xa0 [ 3024.851612] security_context_to_sid_core+0xb4/0x890 [ 3024.852486] ? security_compute_sid.part.0+0x16e0/0x16e0 [ 3024.853405] ? do_raw_spin_lock+0x121/0x260 [ 3024.854137] ? rwlock_bug.part.0+0x90/0x90 [ 3024.854861] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3024.855698] ? do_raw_spin_unlock+0x4f/0x220 [ 3024.856448] ? _raw_spin_unlock+0x1a/0x30 [ 3024.857163] security_context_to_sid+0x35/0x50 [ 3024.857948] selinux_kernfs_init_security+0x19d/0x4c0 [ 3024.858822] ? selinux_file_mprotect+0x610/0x610 [ 3024.859630] ? find_held_lock+0x2c/0x110 [ 3024.860321] ? __kernfs_new_node+0x2ad/0x860 [ 3024.861058] ? lock_downgrade+0x6d0/0x6d0 [ 3024.861763] ? rwlock_bug.part.0+0x90/0x90 [ 3024.862473] security_kernfs_init_security+0x4e/0xb0 [ 3024.863400] __kernfs_new_node+0x531/0x860 [ 3024.864106] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3024.864915] ? cpumask_next+0x1f/0x30 [ 3024.865566] ? kmemleak_alloc_percpu+0xaf/0x100 [ 3024.866353] ? pcpu_alloc+0x12a/0x1240 [ 3024.867001] kernfs_new_node+0x18d/0x250 [ 3024.867750] kernfs_create_dir_ns+0x49/0x160 [ 3024.868548] cgroup_mkdir+0x315/0xf50 [ 3024.869228] ? cgroup_destroy_locked+0x710/0x710 [ 3024.870081] kernfs_iop_mkdir+0x14d/0x1e0 [ 3024.870797] vfs_mkdir+0x493/0x750 [ 3024.871432] do_mkdirat+0x150/0x2b0 [ 3024.872067] ? user_path_create+0xf0/0xf0 [ 3024.872766] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3024.873653] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3024.874546] do_syscall_64+0x33/0x40 [ 3024.875223] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3024.876107] RIP: 0033:0x7f371d026b19 [ 3024.876731] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3024.879868] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3024.881169] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 3024.882395] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3024.883638] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3024.884858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3024.886091] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 18:54:51 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r5) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r6, 0x200, 0x70bd2d, 0x80, {{}, {@val={0x8, 0x3, r7}, @void}}}, 0x1c}}, 0x4) getxattr(&(0x7f0000000400)='mnt/encrypted_dir\x00', &(0x7f0000000280)=ANY=[@ANYRESOCT=r6], &(0x7f0000000040)=""/23, 0x17) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r4}, 0x14) 18:54:51 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x4, &(0x7f00000001c0)={[{@memory_localevents}], [{@permit_directio}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@hash}, {@uid_eq={'uid', 0x3d, r2}}, {@audit}, {@measure}]}) [ 3024.918880] tmpfs: Unknown parameter '' 18:55:05 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(0x0, &(0x7f0000000080)='./file1\x00') 18:55:05 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x200, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000000c0)='./file1/file0\x00', 0x6, 0x6, &(0x7f0000000700)=[{&(0x7f00000001c0)="b23c097c41ba2f92b7e71e5cb86407683c761eaca65d7c1d5a976be8f85b6986c3b364a78463e99cb285058e9b722448b212d239a5877a06534f589c13bd131903f8db1e1f41cdb705f0ece6eed0d4b3ab6356a98aaf2196ab0843bafdd8cc40cf6c78c251dc197ee380e342a33c18f807b4fd610515c865e7b2437e5f64e237a5", 0x81, 0x1}, {&(0x7f0000000280)="655e7122668d1d1cce646597100689bbc9d3e07d74a520f940b0edac302dcff661d54d6887521e1b9867101d9ba11c63765f23cbdb932da06bc06db7e23c4d19edba734a80f14ad5cd4a3e1905f8a390151d42682a6d3d97f43b71d5ab01b1aa917e8a1e5614857b58a55168aaf612306e321efc4bd89bea2034b5dccc34e448974cb8e9656f7bfe30acc8bba16ca609e94b8cbe0a535e7489cdb4c8735e4fe2388ed786f0e996e656a0f6412e2dac58000d61ee5ce151", 0xb7, 0x7f}, {&(0x7f0000000340)="d11d9ba71632a188cc2bd2628af6f35e3a4e96a8cf90dfb52bd7cdb9fb7d85fc7a1da3bdfc6e24ccc04a554db8f9f2c03347638d308e9ee866e1ec297b84c3d6c2d43bd5fe822a0e1d656317dc2c05802f195398eb9d14f7d05e731adbf10555fa4d3821ba2f32cb5723d33b70e65c9a93204164714dcf37f1e09b5daa6984a1d07e16961ae5e050616c5b5d9c76793dfe13010be1a46af529f6dc65a0", 0x9d, 0x1}, {&(0x7f0000000480)="236f242464c42db3dc8e71316a2a01a5e5ee6ec8a97518ba898c49f0249f7b9c9a03e432fa7ed045dd3cf0ca835fdb91ee28af57602e2eb6a7f480b7d0b699326e6e5bf4787e6237340a83485f62361e97f67f63af25c2c080df10cf378fde4d473c0b49990f6993b7afddb893da055a29c96faa040de502f542dd12bbf2b39e100b06fe61d13549d65515f0e573790c44bf21887345ae3fea6b7ef84fcfb988d6e2a171220c68672fced41b72d6924eef027a062d3ca730cee21df2671eea284c97016ba15b0e95b087f94810f8", 0xce, 0x2}, {&(0x7f0000000580)="a8ffedb9546640dd375c5a5d7802cc98f6f563c2911bc81f2fe2f9cebf13df972e2ff14ea62ddf9c70356798fec139598f8dec6c29b24594af365e74446965d452705ee0ab85d206b89289f70309062fba92b45ca5efbf50476a5730c8a44ff36835b2812b56dd84f6a95c8339fd7ca29e4733af4b8595d4131ec3a0ab05502fea530d38e6b414c7e9818d331c", 0x8d, 0x6}, {&(0x7f0000000640)="92107f01568c2a26e3262b7e4eeb35c79bf775044cc36acaa4c79f57cdc9876e9c4cc75d47b1bef16f808fcc169aa8a725374d7fbcfa69f5dba678296a87dc6d96c37f05b0be156928c1100225c9ad65cb6ba6390e7da981908a4731ff9f3227c2415840fec7b9b82b4c2c436e14091236837466b4b6227385575bf6e3f6b8e7ac149a8741c48ce8fc6168ad852070e88567de9d5a05e17bf8cd3045fb450c1d53275df9ef082105acf69198cda969de717ead92cdd0f0", 0xb7, 0xc2}], 0x2090480, &(0x7f00000007c0)={[{@errors_continue}, {@jqfmt_vfsv0}, {@commit={'commit', 0x3d, 0xc00}}, {@nobh}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x1f}}], [{@euid_eq={'euid', 0x3d, r1}}, {@seclabel}, {@subj_role={'subj_role', 0x3d, '.-):'}}, {@subj_type}]}) 18:55:05 executing program 6: keyctl$session_to_parent(0x12) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_dev$mouse(&(0x7f00000000c0), 0xfffffffffffffffb, 0x4000) r2 = socket$nl_route(0x10, 0x3, 0x0) dup3(r1, r2, 0x80000) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:55:05 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="6f9064cad06415030000060000000800c300", @ANYRES32=r4, @ANYBLOB="50a74f47012c9106b1ea9e5d2f15a2408f075be5ec1a768372089f0498243bd32b86195b99ef1c519a0ed461b7141bf8e0e2aa9c78effbd9c369c5564a2f030d50"], 0x1c}}, 0x4) close_range(0xffffffffffffffff, r2, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c64666c747569643dd9abaa8b155b041cc5feae9e9473a425e4281b4947ba64928ae319153182992bc0790d00972480886c96925b3d803a1887e1ff91b0eb7ff583e00e8ac373255475642b28ae3ee7cbc6c511aebffd0a0ae6899cff2ad33a5c35740d8cc1e3eec512e9f5af2d88e0e6de70dddc", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=r6, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d1fb27-7ab5-2c03-5304-afcb01cf,\x00']) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:55:05 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) openat(r0, &(0x7f0000000300)='mnt/encrypted_dir/file0\x00', 0x600800, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) stat(&(0x7f0000000040)='mnt/encrypted_dir\x00', &(0x7f0000000440)) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r5}, 0x14) 18:55:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 28) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:55:05 executing program 5: sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x54, 0x0, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x38, 0x8, 0x0, 0x1, [{0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xec}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4c33e742}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb2}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xeeecb38}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xa05f797}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x2040}, 0x2040000) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') 18:55:05 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x7fccd1142000) [ 3039.692452] FAULT_INJECTION: forcing a failure. [ 3039.692452] name failslab, interval 1, probability 0, space 0, times 0 [ 3039.694241] CPU: 0 PID: 12496 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 3039.695174] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3039.696299] Call Trace: [ 3039.696662] dump_stack+0x107/0x167 [ 3039.697155] should_fail.cold+0x5/0xa [ 3039.697685] should_failslab+0x5/0x20 [ 3039.698202] __kmalloc_track_caller+0x79/0x370 [ 3039.698817] ? sidtab_sid2str_get+0x17e/0x720 [ 3039.699433] kmemdup+0x23/0x50 [ 3039.699876] sidtab_sid2str_get+0x17e/0x720 [ 3039.700461] sidtab_entry_to_string+0x33/0x110 [ 3039.701079] security_sid_to_context_core+0x33c/0x5d0 [ 3039.701782] selinux_kernfs_init_security+0x239/0x4c0 [ 3039.702505] ? selinux_file_mprotect+0x610/0x610 [ 3039.703146] ? find_held_lock+0x2c/0x110 [ 3039.703712] ? __kernfs_new_node+0x2ad/0x860 [ 3039.704306] ? rwlock_bug.part.0+0x90/0x90 [ 3039.704881] security_kernfs_init_security+0x4e/0xb0 [ 3039.705567] __kernfs_new_node+0x531/0x860 [ 3039.706192] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3039.706839] ? cpumask_next+0x1f/0x30 [ 3039.707359] ? kmemleak_alloc_percpu+0xaf/0x100 [ 3039.708007] ? pcpu_alloc+0x12a/0x1240 [ 3039.708552] kernfs_new_node+0x18d/0x250 [ 3039.709109] kernfs_create_dir_ns+0x49/0x160 [ 3039.709716] cgroup_mkdir+0x315/0xf50 [ 3039.710241] ? cgroup_destroy_locked+0x710/0x710 [ 3039.710885] kernfs_iop_mkdir+0x14d/0x1e0 [ 3039.711448] vfs_mkdir+0x493/0x750 [ 3039.711938] do_mkdirat+0x150/0x2b0 [ 3039.712434] ? user_path_create+0xf0/0xf0 [ 3039.712996] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3039.713703] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3039.714402] do_syscall_64+0x33/0x40 [ 3039.714906] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3039.715599] RIP: 0033:0x7f371d026b19 [ 3039.716113] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3039.718570] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3039.719620] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 3039.720575] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3039.721544] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3039.722524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3039.723484] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 18:55:06 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x7ffffffff000) 18:55:06 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x422400, 0x80) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(&(0x7f0000000100)='./file0\x00', 0x121000, 0x200) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)=ANY=[@ANYBLOB="adc400e2200000af0180000000"], 0x1c}}, 0x0) openat(r1, &(0x7f0000000040)='./file0\x00', 0xb8c00, 0x100) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') [ 3039.778054] tmpfs: Unknown parameter '' 18:55:06 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(0x0, &(0x7f0000000080)='./file1\x00') 18:55:06 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x8000000000000) 18:55:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 29) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:55:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000002c0), 0x7}, 0x9240}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r4}, 0x14) 18:55:06 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) mount$cgroup(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x1080000, &(0x7f0000000340)={[{@cpuset_v2_mode}, {@cpuset_v2_mode}, {@release_agent={'release_agent', 0x3d, './file0'}}, {@cpuset_v2_mode}, {@subsystem='freezer'}, {@xattr}, {@release_agent={'release_agent', 0x3d, './file0'}}, {@noprefix}, {@xattr}, {@noprefix}], [{@smackfstransmute={'smackfstransmute', 0x3d, ',:}&[}@]/\xec\x00'}}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_gt={'fowner>', r1}}, {@fsname={'fsname', 0x3d, ',:}&[}@]/\xec\x00'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@fowner_lt={'fowner<', r2}}]}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r3, 0x4, &(0x7f0000000040)=',:}&[}@]/\xec\x00', &(0x7f0000000200)='./file1\x00', r0) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') [ 3039.933831] FAULT_INJECTION: forcing a failure. [ 3039.933831] name failslab, interval 1, probability 0, space 0, times 0 [ 3039.936525] CPU: 1 PID: 12523 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 3039.937966] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3039.939696] Call Trace: [ 3039.940247] dump_stack+0x107/0x167 [ 3039.941069] should_fail.cold+0x5/0xa [ 3039.941869] ? create_object.isra.0+0x3a/0xa20 [ 3039.942816] should_failslab+0x5/0x20 [ 3039.943634] kmem_cache_alloc+0x5b/0x310 [ 3039.944485] ? sidtab_sid2str_get+0x65/0x720 [ 3039.945402] create_object.isra.0+0x3a/0xa20 [ 3039.946317] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3039.947370] __kmalloc_track_caller+0x177/0x370 [ 3039.948354] ? sidtab_sid2str_get+0x17e/0x720 [ 3039.949292] kmemdup+0x23/0x50 [ 3039.949962] sidtab_sid2str_get+0x17e/0x720 [ 3039.950874] sidtab_entry_to_string+0x33/0x110 [ 3039.951837] security_sid_to_context_core+0x33c/0x5d0 [ 3039.952917] selinux_kernfs_init_security+0x239/0x4c0 [ 3039.953982] ? selinux_file_mprotect+0x610/0x610 [ 3039.954963] ? find_held_lock+0x2c/0x110 [ 3039.955823] ? __kernfs_new_node+0x2ad/0x860 [ 3039.956778] ? rwlock_bug.part.0+0x90/0x90 [ 3039.957671] security_kernfs_init_security+0x4e/0xb0 [ 3039.958730] __kernfs_new_node+0x531/0x860 [ 3039.959629] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3039.960633] ? cpumask_next+0x1f/0x30 [ 3039.961435] ? kmemleak_alloc_percpu+0xaf/0x100 [ 3039.962410] ? pcpu_alloc+0x12a/0x1240 [ 3039.963222] kernfs_new_node+0x18d/0x250 [ 3039.964087] kernfs_create_dir_ns+0x49/0x160 [ 3039.965024] cgroup_mkdir+0x315/0xf50 [ 3039.965821] ? cgroup_destroy_locked+0x710/0x710 [ 3039.966800] kernfs_iop_mkdir+0x14d/0x1e0 [ 3039.967670] vfs_mkdir+0x493/0x750 [ 3039.968424] do_mkdirat+0x150/0x2b0 [ 3039.969183] ? user_path_create+0xf0/0xf0 [ 3039.970047] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3039.971133] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3039.972207] do_syscall_64+0x33/0x40 [ 3039.972977] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3039.974036] RIP: 0033:0x7f371d026b19 [ 3039.974809] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3039.978652] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3039.980243] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 3039.981726] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3039.983211] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3039.984702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3039.986187] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 [ 3040.001022] tmpfs: Unknown parameter '' 18:55:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 30) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:55:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x2014d1cc7f0000) 18:55:21 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file1\x00', 0x1, 0xa, &(0x7f0000000780)=[{&(0x7f00000001c0)="f691edc83e7cb15a9ff418727c077eda1a4284c920ddbfe6d1784f721fc9bb94293b062d3413da4f35690f80c7e77cf97f8c21e5589018679cf4ff7f1e0ed4cdee14d717479240a367b2b5e34977f97ab49a01c75b3b39481f1ce0184e3ecf82243a835608cdf9f7fa47c545f287ec5c060db84b40033e5465cfab8f7a1c6b44230150419cc9740eeea1c00902f0f8fde0a9b017600972847728e0aa82390785fe5873fdecebb9e1a48c2a06b4a62c128ffefacdca1042b28fd8ccd68f431e797d67d3aab5fe47c2facb0e", 0xcb, 0x6}, {&(0x7f00000002c0)="1e236898a5fcc0a9a4cb1a55426859ff565eff145156fa26775b26ba081bfca27691264b4c76c545f4bdb3506371e85d565369f0808ce7a4b38c1607c00134e4a52293b41879e02ac3082d19967e18ff479b2a8bfaeda7149b6dad2a8cfbd040d3fd1dcaf1cea7eaa8", 0x69, 0x4}, {&(0x7f0000000340)="74dfd653ebaff1d6a8a9d8e9469608a854ccec7209362d1a8ffa7a9dee98a3a139f96a8292cc7809fa59dc8c16cd9f21bd3b8091a22970aad375d297d56f0c7c6262cb3251e6e396a33a3bc9156be63869107f3e75e8b0fdeca9d5b055cdea206518bd8b49", 0x65, 0x6}, {&(0x7f00000003c0)="87a85c916c722eb9a5f4aba0a237a90245ec54b1a7b3f182ffe6a6aec26bc5312b5b460cd1d6c4fb54f1b29aa4ef3589796d7eb0f7cd1cf88636558d137d7fb1adeb7d6740bf78de87d0f4088abf087a18c3c2a39800d9707f152ab0d7b4ac016f991ea2b9f81a27b1145b1436757e", 0x6f, 0x3}, {&(0x7f0000000100)="e0646c8b1f802d0f57b9c9c74b", 0xd, 0x81}, {&(0x7f0000000480)="9bf9d92602881f2491a8a0f52ddc85876bce6860851a9b4a9c2eb0796f33637610e0d3f9b43d28f67092499ecda92a468c0b01f97708da286b5ad62a696444c87b1a2397203f09a64ef24f5be1d892802a9b5c4f9055fb2d62baf2e4", 0x5c, 0x4}, {&(0x7f0000000500)="1097037fbe50b1a3c0e2dd9b66e13621cf2a0a68ebe7c153f7d469a891c80aec24f1ace2dfe7754027b19f3c71e594bf955f4cfa0dfde7b72fd665b6513e3c8831764f5d964d6da0", 0x48, 0x8}, {&(0x7f0000000580)="e02e875a162fc857d78f7dfd5e353896b78737ab43f0652cab31c02c5d1f0f3f66348ca7c1bc7163101c220fedf68667f7cb7aec01f14c6ff661e9ace06a65285537c14c861315eda585612d35c34b48649a2122c7a28539159377e0335eb8c2b3e241fe2b95b6b8f3ec6bf32179451e1ecbd26e77f29d061f310657d7160327e793fbe921cd1904466118add4ee4fba2498778f0821c395e5d1181178e0352944b093f180dca4", 0xa7, 0x3}, {&(0x7f0000000640)="fcf8d82dfecaba700d390ddd938bc4838ceeab8ea7a0abd48b3d23acf610f72a615cd30f67ceaba1e45244e6c34d72a2eba49603f191ce9f1b68", 0x3a, 0x7}, {&(0x7f0000000680)="b82b94056bc95c6fc81a0816bafb5a8c79069e9c5c88c6a7cdac1621bb417f1c795736fb717a7c4786e3211b2ead1ae38d053e2f933db06394e651266bccff56b842ac21e159697062e60f03c8beaf624c992326c0f9d2c8106b4b539c4684599bb2cfa440fd7de131e62cbcb7bb4841cbf911859e8a0762fe189d636ce9be1ec03ccba503a2c4959028730295a4f92df1208e64f01031ebb72dd146626c0e8c82a001b0f0dba7dbf969b3ed372d02fea673ee5fc3b6422206b5ccdeff6d14d90f4f4739b21611854461e91dae0f2d0965585d489914569ebeb27d11f702d5635fe860cccf97", 0xe6, 0x3}], 0x2000000, &(0x7f0000000880)={[{@init_itable_val={'init_itable', 0x3d, 0x4}}, {@jqfmt_vfsv0}, {@prjquota}, {@block_validity}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1}}], [{@subj_type={'subj_type', 0x3d, '\xc3'}}, {@uid_lt={'uid<', r1}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@audit}, {@obj_type={'obj_type', 0x3d, ',/\\-\x8d'}}]}) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:55:21 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x3, 0x80000001, 0x200, 0x9}) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:55:21 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', 0x0) 18:55:21 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x0, '\x00', [{0xe1, 0x7, 0x1, 0x9, 0x80000000, 0x8fc}, {0x1000, 0x9, 0x81, 0x8000, 0x0, 0x6}], ['\x00', '\x00', '\x00']}) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r4}, 0x14) 18:55:21 executing program 6: r0 = epoll_create1(0x0) io_setup(0x880, &(0x7f0000001440)=0x0) io_submit(r1, 0x1, &(0x7f0000000340)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) r2 = socket$inet_icmp(0x2, 0x2, 0x1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001280)={&(0x7f00000010c0)=@abs, 0x6e, &(0x7f0000001180)=[{&(0x7f0000001140)=""/32, 0x20}], 0x1, &(0x7f00000011c0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xa8}, 0x12000) io_cancel(r1, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x200, r2, &(0x7f00000000c0)="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", 0x1000, 0x0, 0x0, 0x2, r3}, &(0x7f0000001300)) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r4, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:55:21 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@private}, 0x0, @in6=@initdev}}, &(0x7f0000000880)=0xe8) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000001600)=ANY=[@ANYBLOB="06000000000000001800000032f50bfb1dceb18d33b521a2520d0883110295275b3ff10d", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0/file0\x00']) ioctl$CDROMREADALL(r5, 0x5318, &(0x7f0000000b40)) lchown(&(0x7f0000000ac0)='./file0/file0\x00', 0x0, r3) mount$9p_fd(0x0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740), 0x200412, &(0x7f00000008c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@version_9p2000}, {@uname={'uname', 0x3d, '}'}}, {@mmap}], [{@smackfshat={'smackfshat', 0x3d, '&@\''}}, {@audit}, {@fowner_eq={'fowner', 0x3d, r2}}, {@appraise_type}, {@smackfsfloor={'smackfsfloor', 0x3d, 'proc\x00'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_eq={'uid', 0x3d, r4}}, {@pcr={'pcr', 0x3d, 0x2d}}, {@dont_measure}, {@audit}]}}) r6 = socket$unix(0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f00000015c0)={0x7fff, 0xcbdd, 0x401, 0x3}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0/file0\x00', 0x400, 0x7, &(0x7f00000005c0)=[{&(0x7f0000000200)="478cc00c19957b7e78e8752f735e04004d28172bbdbd1c415aca83dd109d689c328f106e297bb1327b913879027d32e4bda6fa9e083700909f6835869909a69940d6eb3b9e376c7b7efc712997b4362c698ba6726074380598a79adead4914be8799f8840c38058d9d8582c3265cb245760f519bd0837f5c1775e56cd6948f1adf8934a069f7d0363879865a942f37726a7a3b9471efb7737d27b4116522dfe63cdab74be8379931bdacbeadd2df", 0xae}, {&(0x7f00000002c0)="a64300cea76acb516e4ae6aa5f8651912ef6c2647336d0203928c231211df277c66eab8d36892a0eb1078b1534b8eefffb891b787af506be0c442df0670e05d3b18079b920f48fa8fdc56e691d78c2587f9be2123bdd0405bf575c612adf881edfc049d00b54435dc4bebc991d126419b854f52b00b6136f", 0x78}, {&(0x7f0000000340)="b0452374e28a2f6d2cd5c3327b789100ca1057dd8814c62933565c738bc276d8d84b1b2aa1460949f250f992103ca7d46d4808d2a72f33afb7172219685d4f82f9eb56adf505eced460b8b2427e76622ec8c7b51e0ef618ce5e47211c186275416db92e5", 0x64, 0xfffffffffffffffe}, {&(0x7f00000003c0)="c4a015d31d3ab20ba705535986143f219216b3b802c95df6ad20ea0205ccbbd92acc41afc99f2a93c46e71025a1c6f909394e387d703f7ad0926389be7d279e0fe9f03c5f8ff49bfba95121311be7d99ab7c96684e05f12de7f62e4cb2dd5bde5ba7c3a0", 0x64, 0x4}, {&(0x7f0000000180)="a4bee006aa4dbc14cc8c845a7618d100c46944d9d951cfd7a5ae2e12a9ffa3087eb5ac1e607afbd6aa9c", 0x2a, 0x8}, {&(0x7f0000000440)="489c2d8fc0c12eb8f4ea649b5dea06e19f13eda56d329dd7eea8ec36b5762db7b20e04a3ff4bcf8f6e53c9941317757da7f65047bb28676492898a629c2a0d444c1fb354a979cb79feaa1dd2", 0x4c}, {&(0x7f00000004c0)="48ca22866f5aed1c1bba1676fa968b7db3e8adc1c58c835611e1bdeefae43ed57cf06a12764855404ab242e400a29ad2c6ba8a9bc0f10757fa7b2fe3115eb81131e97c67123249fb4209a9db4897ea374e19c8354d7fa83930269080cdca1e45e35a3a3374b4af73c6e76ea77736f1a5b97462c77ea0e836afdaa5a3002c55f831bdc0c63b46c72872a4e88c7b1209c7b00ad30da5fb8247beea4ea221fd91070afa6ec14e6c1dd9a0df89ce1630bd37339533e9d5a626bedf5a663a1f598dca1ef6cec7016a75641ebb5179aede648157c2e6f4f6568a8bfe71927a3377096b66cddfd4ee6e2e9d99a0675bd24166", 0xef, 0x5}], 0x2880, &(0x7f0000000680)={[{@uni_xlateno}, {@shortname_mixed}, {@shortname_mixed}], [{@uid_gt={'uid>', 0xee01}}, {@obj_role={'obj_role', 0x3d, '}'}}]}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000a40)='/sys/bus/workqueue', 0x400, 0x4) symlinkat(&(0x7f0000000a00)='./file0/file0\x00', r7, &(0x7f0000000a80)='./file0\x00') [ 3055.589604] FAULT_INJECTION: forcing a failure. [ 3055.589604] name failslab, interval 1, probability 0, space 0, times 0 [ 3055.591957] CPU: 1 PID: 12540 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 3055.593075] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3055.594409] Call Trace: [ 3055.594842] dump_stack+0x107/0x167 [ 3055.595431] should_fail.cold+0x5/0xa [ 3055.596046] ? __kernfs_iattrs+0xbc/0x470 [ 3055.596730] should_failslab+0x5/0x20 [ 3055.597344] kmem_cache_alloc+0x5b/0x310 [ 3055.598020] __kernfs_iattrs+0xbc/0x470 [ 3055.598680] kernfs_xattr_set+0x2b/0x80 [ 3055.599313] selinux_kernfs_init_security+0x26d/0x4c0 [ 3055.600147] ? selinux_file_mprotect+0x610/0x610 [ 3055.600907] ? find_held_lock+0x2c/0x110 [ 3055.601554] ? __kernfs_new_node+0x2ad/0x860 [ 3055.602264] ? rwlock_bug.part.0+0x90/0x90 [ 3055.602934] security_kernfs_init_security+0x4e/0xb0 [ 3055.603754] __kernfs_new_node+0x531/0x860 [ 3055.604503] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3055.605261] ? cpumask_next+0x1f/0x30 [ 3055.605895] ? kmemleak_alloc_percpu+0xaf/0x100 [ 3055.606649] ? pcpu_alloc+0x12a/0x1240 [ 3055.607291] kernfs_new_node+0x18d/0x250 [ 3055.607962] kernfs_create_dir_ns+0x49/0x160 [ 3055.608698] cgroup_mkdir+0x315/0xf50 [ 3055.609318] ? cgroup_destroy_locked+0x710/0x710 [ 3055.610064] kernfs_iop_mkdir+0x14d/0x1e0 [ 3055.610727] vfs_mkdir+0x493/0x750 [ 3055.611291] do_mkdirat+0x150/0x2b0 [ 3055.611871] ? user_path_create+0xf0/0xf0 [ 3055.612558] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3055.613395] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3055.614226] do_syscall_64+0x33/0x40 [ 3055.614830] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3055.615654] RIP: 0033:0x7f371d026b19 [ 3055.616267] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3055.619196] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3055.620446] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 3055.621596] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3055.622701] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3055.623873] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3055.625032] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 [ 3055.634028] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 3055.656839] tmpfs: Unknown parameter '' 18:55:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x20dccecc7f0000) 18:55:21 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', 0x0) [ 3055.673756] 9pnet: Insufficient options for proto=fd 18:55:21 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r3, 0x200, 0x70bd2d, 0x80, {{}, {@val={0x8, 0x3, r4}, @void}}}, 0x1c}}, 0x4) pwritev2(r2, &(0x7f0000001680)=[{&(0x7f00000001c0)="0cf86d1b8fca3ad37c17017a7e379ace0f44b485e4ee05d7ec2c4c08454bfda662fe15280fc80c51c8ba249425da21e4bec599b9ff585606f96c344b5dc5ab24cc3746889f7cdef188aa5cff2f869ae489495184e683b6d9cb8203178035ddad91e920b86e65155757b3045d9f8efdd2e834971bb19725914c686607be6186d748840ab241e743675a8815a1700eab217f6507d8fc14e9c07cf835cea3df61a50c26288bf60f68db3b198c99325f7d8fe5dbcb139a938cf811d79fb6a55df0dca1a5072b9ec85a502fc771dc7a42002c20a81d77581ad114a6c4ee112ad62d895774f9b8aeb67da09c6a1d82b77bf7f2ebaea97908cda50a4c2b6bd6eb2c", 0xfe}, {&(0x7f00000002c0)="fc84857c228f5612342a293b569f8dd5f55972d467ff0ea7464cfc33fc5acca8da0a78ad32c002a6abc070d51de39b090c79251f8c1bf1c0de96fb0df2eee47cfe00e0048be1d1d4753148d868366aa27999f772fe782bada38ef478cd4a27840f144a4efd566cd33a88d2bb5b991c8ea0e1cc59eeef59dfe1a1a2f6d5a4dd200a20a32bc86170513775206c25e910fb63293b9c", 0x94}, {&(0x7f0000000380)="7921ba7db49a4e7a2aae6705775da5929c2ebb9cf2a4ead0b0e5d0047261ed8bcf82b6af939cdb4ae18096b6ec455f3854371ac281bea40981f10d74ee16d4a3bc6ecbf67422121ac14a493c39cf3c35921b932ff62d7b651b994c5385ba77f491c0635fc82e9bdd81472ae3f281e8db62b249f72f2375aa30677fe78d53fc4f9a2129fc5021c28e4110dfcb43d20ce5311985b1a8fd5a473022", 0x9a}, {&(0x7f0000000480)="00751e72774788765b2a614b9e4458d221a8ce39df69303731a4373e7f5529430d5369e6597b5d579c664363109528c2acd1f543ae1e0c2b129b5a6b3994f93853d543992042ce1db801fb1ba4c8f1946540b7140375c77d18ba62a2b9c41ffc81ce5bdd8583d2e5184ab64742ebc9b87aa3b945d520e9044e7fd8c47b324d882d377114a0453bd1cf517bbad09d3e6987b8443fd3df563e916fc37f799c474e11d7aca0ba3fd9230795ec8e8ba34f5c317e2f2cd1103b051f43917fc82345512390b82dc8e9360e58d3888b43254362", 0xd0}, {&(0x7f0000000580)="0e1d5995be46be80b84d5bc4767e79f9b30269ef541fff164f38931eb0e8a42b170cfea43e504de2365f8838e615e6b2aa202bb088d587b1bc2adbfa724da111898ff9ff046e4d160ff4174c25772bf4f9a5b5555d12553934c304d24cd263659d1182b6b4f7293c38bc836a90c2bb793b90ab510985df433576b2422cf8567cee599118eb01540b0894cae87eaf570195aaff83b96bfc3761a29ac8abdd53a3d00ecd5c3a1c83ed2fe0395ec830a6515dd3c998b74f7604e7d8c5804bdf9a0aab9d7301976aebe01c9c9df62d58e19726e175d62ce26e8fce9f1cc710b08228e416dbacfe0d179150b7c73f018dccf750e64fc5d5539a6e40e7ce9aa3f7b52de6e864dbdaf929836e5c4898a550796535c4cded329991a0014e03470ad6b7ce31cdc4ebadf82980085dad8134848b619ae20372c6516b0f2d7f9bc208224a78cd3d4f22dd043ba24b097d60b4ea4232d1edefc22d9f4bcf5e3ad80acd0d538ea7439ce578d2bc86a0b3ab92264821fd87c70ed3d776856b4d1888c73c9ca7ed92c142544f64cd106680328243a117c8f336e208731562a0a94ced9c09267e90e0ffdb37b45da23bb6b6ccddd5fe4639fc4c6b25f8a15fe6fdc509fc0a9925ea007ce0f4ab52aae13d7cd1fed42022332aed6b91b998660784e58d315c6e10f59b9ba8f3efe644104992bf1848df0c5fae67e8c0c449c35fd33c817fbaa44611cc71d05414542c5ee9723456c8da68cacd2c2435ab2c75e3540b9ab21f5d95b838141b0b7ea25d10199d965259e182588970a7e8f343e5b70cabac09b3b3b4b732aa1d08920ae3ebd850c5ede598db7841b7735e7ab08cc7e6714de04d499c50502b82ae08ec20041cb9fe4e89470707901132f10577e90cbf33d15b7aca743809866b4d242559bbcad6506fdc224e510dbe71ca29d616893a417aa5d0e4b2a057ed35e676c12c7294c1981213351b7736965438490a96d6ffba8918af3964e44b7e021f1c21de98a3803099bec612617aabcdea7a8b96df58efbefdf72a9c108dbc0656920ea36e9c4fcd0be1b46fa5a09b1f625eeb1da6b3e35a6bf69b82dd6d7cc423dc4736f3400d9a49b061f5a4e4960a87a48a581336aff3803563e51367402dbba0960c917ff102c80a01f5bb9aaeeb47eded312bb03664a603db0a676e641da5f50bd4366ed3ebae977faa049d826ff35b2c7923d2a6eb69e49bc6c161a5924d57a333fb232f09f231c6afd1151d18b548998c215220000924401538d555fcdfea2ef8f1696cb406e0052b0e1a0cf9329e8f34863b66985991279b1c8e5de04ece64796193b8a12e8f1316848d47af6386c2908aac6dcc662066c4c3bbd37ccc0a0590368aaa4daf61d136ecab5952d996a28d2cb12c486c3566b3a522bcff1d4e479bfd608b72019e0ef2904770c4796cf4ae4dbb89ebd7325f4450a57bd2d3bf0127d45d80c130693dd57e29d9a2bcc53c2e34b94a0aa5e3d64bf520c58bb6da4e6b969007aec7a158971001d2d2e754069e91770d235f361bf6905743a1da2e32fd7bbd704fad850f3bb9cf5725e1efb96aa872f053a652dd9077766dd68347878a629607fdb4444d6593ee85db3d79cc878806bee1284fc67fe7e631289757a5aaa6bee9735aeba7989ea97c3df023cfe5049d167668b994bd5eb938148b3d827a0dd701547ef26da0dcd302bb5afe5b2c60d2e099ef782c6367af10f5b74fa6c6ad43abbb56ad276e55d4edc48144f412506a5c06c77ad50a407317a776feef5d5703029b248f83b7c063948729f465d1d63eda3042e650af4a7d7c573b3b9867430f549bfe0c4dd77be7f9b41cdd56d8268ee6987069ce2221fd2bf9bfdea4d5d2b4e9e3c86bf637c5a1eeb00641702dc4864f04a5f23d6924cc072964f6f8753ae045180513a6c0962c76a500c64bd8b15f18db454907eca935937a022925acabb60c3a04074882750e81f57b0da09bc012898732172960cdd41c417bd4865e077a0987ec2945821a96d278168489d05adc23907635f50e0703c62233fbf80554d888c40de764995ae0292b70b7b6a54db3c36a3819b82e0182664f13fe32564f8fdbd2cbb527fe7984c8c63d51dcc719ce43b5e097c25f43aad1cdaeb03ce57bbc1f63e6cda5e4254c6c494506337699be9b5b2d4c2b9f461e44e2558e6dc6648fe009c056fcd43c922ce0ddfdcc2213b0dcbabc65d011924f63c6be216e8d63d1dc96f942a0bbce7b4f058f616bd186fefd55182e1e9c5a82a10bff4ddd6d8d4ff950a2b4e5ceb09490819658a44531c3cb1c4a6458f66612fe496501ed1f3531204945831f861682d850403f585965f5c0b11dda523ea23b9937cfc979372cc8c150288bae3a629fa70395827218d6149d69bd0720d6da5d37aca74982048eca2bd1168671afde5e28a811ec66a177442c2f17eb78dc0fc8b7ad73f842193b54b077ae857e4c1d875da3c9e085bb5d0d70042292350fe5aaad601de2fb828603419ea088306109bfe8c1f07e9541829233871c7a8a039e5d61f787c781404e9b121a4d9aec087348d99ee1b1bacd994529cf82ecb964834d87e43083c47966bf6c3268e3d425e58013e50bb233bef7bfd7a310cf4ce02ee522c6047fbfc3d4889921e59ce6df00ee09cbff641fb4ac687f3c36f3632f4b2decccbc2fc0e755855fca28983cd4de60c61a27bcd914ae1cc991b214a54083417b972fe5142a0e4ed8891c141218e090eb9f7940f73dbe7bcd664366f4d3066ac90bfa8df7adf81b2da27c64c8b70250033772f3213364a7a5711a1e731ae471d92ad237981157847e30365f6deeeb90bd33bb1494022bc4dce38fd8e64b2139c8d878503e8d3566945c2e67144fa5b723c4e4a7b3555eaa94b8d496973764cfe11bbce884ea190b56406f8113e5e4c788d1af3d6dcef411054b3305c9ed8ad998ed9d14070a5d7517f485aaeb33e94c13c4350c4bde48aa744cc92b4317d0b74dc2954898af7b1622bd71b5b3712d9a2f68cc37f558816fe4c76e103c2cfd44d15f596d2b84448c72409233c79fc2780dc9ca8951d39731401b30f9a9cf234126853c95493ce58ab2c3d353cf73bcd2460bf89bb69b290ba4f1b73bb06d9a819ceaed56ae848cb7cc6f1a2834a56897ec60649ed32970c4377807d55b2ec9019a69396012576484f0ebf43aa4899cbdc1196a2a91fe0718369c0b889e102984c78dfc354bc0cbed15046e3e1249ebc83d5e5aeb6815a1d3cf52634f3deeaddd63ca0d67ac42208a7baa3f454575958d77f2072289fc2e453a6d2be75e23ae9c75fbcaf156a823a489b4d0b251e674e77d61cd23d06517cd7a3986bbb9d0de96ac31a7308fd2e1894814d4fa8c4dd6b8783e402b891b41ae9e3f38fcb951ce8e92b62f4d7844f3938931615b19af74d7e3b311143bc4c96d5cf42c4c984bed495d3d4d8e03b8920364a8ff041e8f5037273238705341fcbc2ec2932033fe58de984b8ab75e8a24c32d8a8d9e1ab05ca44c9c4e0d0b5aed0cf302637e5880d25464a98f248629afcf8f5f1044a9398e901bc1251374c1732e15a3ff997b27cb1854f1ff7e55a04de0a153b01da17ea1152441cdf373093c9854596b631219b4b5d337ec52986130ce764cb72b06403fb115d6bd2f9b10e9c5fb96c9b25f2ae66eb8492aa034e180ad7671cd99d649b46ccf30105ef4826dff88188cb7fe73203dc0f5b20cb006cbac2aa9a19b0a5f87025b91d85b86ee7d75421caa6b31f11cb8d33526c415a32698ef0dc14ce19e19576041f39c1c6c55f9debd372a49a3880cc480c8181e983ae162e19e187f8198000e924a996c4b6207502ed4431bef469df9bc7ad01fcf581f7a9f7846916199884665828010dffa088a9c9bc9ca18f52d04a6097a9250e75f4c85362b1d1af9e01e2e32e1f81e5aefebc058ba14cc7bb51558576f505a4c26f2e8f6ce0c37fa12234c8cb5197eacf2d1598e618a3cff3d0012977b7800c108086f81a0097ab1a01537d6bf7c092667467e21125ad041da1b4f37d0860094dab1efd16e3cfce7a8882274bb9e3cf9b64a81fa6ca900ce7cf9cc665b1fbf6f8304f7579f01ea3b5d9b1be11a2151d99bff8ef9df8ab83debcd68f8859da678f9208161f0e1c77e94abdb58b0c144e961061af51f6f903a8e532b334a454011dfadaf6f8911be8b056e91a3987d3666b51ae99c58e85e184432b6c3d96c4ed5aa1b25286090f2a7bfdb3ae804ec617df65eb29c329860f02b3e76b2fbc40473843aebf7b4793fefd8e115ba443f5bbd435479d1ce770b64561e6bbc35998b22be98ebc477496404a2e74ec8abb14c167ae885092acc6416935dad04ea3f3d42da7c5ff7a812e6e04cda4f1fa3d6660cb40b6bedd921dccf1549a45c5ce82bd9b5c757c3ca4be8605d9b4162ab92fa2faa7db0884c9607143b9987a0c95beb1c9b09fa9e9bea4a15f2bdc6c0d9655b57c3dc705a69b9b59f0e95876d797b512050e7b6baff1fc96a53c28b979395876c738fea33c11bc73537ded57b8c9241f25fd3d3b4cb6923fc0abf638927ccb34099f73a676efc31fb4bfb209d539e49e2905ebb84a7b8706073d60a114ac7e9c417c6c6915952adaa7bf402fffda713f96c0320fe7ed0b2b8516d3213cf671afe514171164058014cb358a92ed8dd793d2025f29251500f0b72e968052980fb9272ed6c2fe0679001fd5f611fe87a096b901a61cc9b8c65ed5df8e02d15ca3946cc761829c2c10714e5f2e3c9b2f3bdc6593941960bf41abced437b85547a431ac4752012d797c79d76b5f3b1b206de202192747e958490193788263cba4807deeef4985c29d7ea881605554239d926635f325e1063e46a55b5466b47e983a2b967ce09c914cf60a386a2f95b1e932a611d6361586fbd0270be59539019c88bf83ce0cd3f5dcc379ff5d625bfa8e63c3745904eda6858378f9767dc3bbea578e5e21e579a0e60f65c2ddbcf90aff03fe2e59827b77220d14256564db3c04291750087f93f6d0e0b400c7ca07c591078f9ac01b1fb27fee306ba45fc41ac0f432e5709c14b7aaf68543d28ac42717855a5ae9715cdbfd30f4fdd3847660b4af7ffca43b79364fb7c912bd4abdbf2193dbd80b76ecca201b0e0f5faad28080db1011ad30b100e165870da5900b11fdf9c02b3b03a975c3b9b6984c47e9e62ff1d5909a79c9f4bf99b2477e58d107cf88ae25a4eec416e10b836626524f8189fe5db6eca1f383140b37f9e5aa2c730145c5780bf92d415fc30bd3fc805a5ee18c2d4decdecadef77d13e0a45fa1dec05e52602377f692aa8e12a5dbc97fe25043dff13b5ebb7931df846251ed456b710c6c8cd99d857bad8cb4a1eb8726225365db372cfcce9d23a5608212bd1d9450234f048d43cc5a8910a16006f05c8490c5011f1e6681ff759fa2f01dbe250e0f5f2d38d138e6904eb0fdb2a483af6095a3c6d6b74296f1f6d7e8a44df38450e1e446403ea41356417b4cdff5ee77a420c188efff1ceae24a34d64399e288605814ad1260d655c601d22ca5a435e29311a710eef1fdf1bfeec3d99c8e6e467186b6aae746b74372bb1e6f81c5713a2dab53e57587277ae0276259d29462ed7ebd5653f15b0612a2c4cfca1c31ae0f642732f20cda0d1696cdc9aa7733379b7abcd39e467524c8132809109c63082b566f4e3d31b9a93a8401430f82fb2fed0d74b679c3272c64f9bfd72ae8c9166bed959c92e97d662ed271a7c51ec181491f650977a17d3283ca6d4aa146174bceba2d1fb70d116149991e03100", 0x1000}, {&(0x7f0000000040)="aeae854395a23fc1d0782fe99196de17a1f658dbd4f2e5ae9cc9fa483db6fad8e9e7493d2105932c9b8ff0b0d4e1", 0x2e}, {&(0x7f0000001580)="889f9344ecfc2aaf436f58c0499fda408abb06c48fb0ecf6ad08aa08a935e0d59549b0a2dbe758e00bc8725ff30685cfa187bf1fa604ed9fef0e3c1ad2104defb1106a35f12bfed932a74212ccc73205bc1873be0fc63f19afb2561a98d76f37e59dd7801220c16f4184bcd7fbc3cbffd5de76e2d008382da507451f6cf1d1dbb7c826438c03f1977bcda408ee5440feadf1d63e2107dc01b9f94b935d54aa166fbd27d66752aaf78f4f7d11082f5896d335b14aed29aa77ea58d8bc19f2bd03aab9257548038017b37813b45a5c91a9f188f8fda8507f3e42730a8ebc842454b2ec84574a8df754ed71750fb06b34ceb1bc21a86dcb3d6874", 0xf9}, {&(0x7f00000000c0)="f6295cfe2044fdaff0d27cfed6e6f9d100b36cd8fbbc90dc1828c2d3404e8658304f68234cdbccf7abf8d0e450a837ace48c85c0ca871c3eb669505dcb1ba49da82efd8f2adef42b94d0740c0c6d9881fa0a555b0ef5756e1f326163f0e7754170b3427512d4a7", 0x67}], 0x8, 0xfff, 0x7, 0x2) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:55:22 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) setxattr$incfs_size(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=0x81, 0x8, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat(r0, &(0x7f00000001c0)='./file0\x00', 0x400, 0x90) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)={0x1c, 0x0, 0x400, 0x70bd2d, 0x7e, {{}, {@val={0x8, 0x3, r2}, @val={0x0, 0x99, {0x6b3f, 0x38}}}}}, 0x19}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x110a}}, './file0\x00'}) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 18:55:22 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x20fccecc7f0000) 18:55:22 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="2c76076412cfb5", @ANYRESHEX=r0, @ANYBLOB=',dfltuid=', @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=r3, @ANYBLOB="2c736d61636b6673726f6f743d002c6d6561737572652c6673757569643d37356431666232372d37f8a0a4e4326330332d353330342d61596362303163662c00"]) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:55:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 31) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:55:22 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)={0x16}}, 0x10000) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') 18:55:22 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}, 0x0, 0x0, 0x14000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000300)='./mnt\x00', &(0x7f0000000580)='./file0/file0\x00') mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000001, 0x810, r0, 0x10000000) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./mnt\x00', &(0x7f0000000440), 0x100) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x38], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x39, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r4}, 0x14) 18:55:22 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file1\x00', 0x14000, 0xe5) faccessat2(r1, &(0x7f00000000c0)='./file0\x00', 0x2, 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') [ 3055.818965] FAULT_INJECTION: forcing a failure. [ 3055.818965] name failslab, interval 1, probability 0, space 0, times 0 [ 3055.820755] CPU: 1 PID: 12570 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 3055.821584] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3055.822566] Call Trace: [ 3055.822882] dump_stack+0x107/0x167 [ 3055.823315] should_fail.cold+0x5/0xa [ 3055.823768] ? create_object.isra.0+0x3a/0xa20 [ 3055.824324] should_failslab+0x5/0x20 [ 3055.824775] kmem_cache_alloc+0x5b/0x310 [ 3055.825260] ? find_held_lock+0x2c/0x110 [ 3055.825743] create_object.isra.0+0x3a/0xa20 [ 3055.826269] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3055.826873] kmem_cache_alloc+0x159/0x310 [ 3055.827369] __kernfs_iattrs+0xbc/0x470 [ 3055.827841] kernfs_xattr_set+0x2b/0x80 [ 3055.828336] selinux_kernfs_init_security+0x26d/0x4c0 [ 3055.828943] ? selinux_file_mprotect+0x610/0x610 [ 3055.829503] ? find_held_lock+0x2c/0x110 [ 3055.829992] ? __kernfs_new_node+0x2ad/0x860 [ 3055.830514] ? rwlock_bug.part.0+0x90/0x90 [ 3055.831066] security_kernfs_init_security+0x4e/0xb0 [ 3055.831670] __kernfs_new_node+0x531/0x860 [ 3055.832179] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3055.832743] ? cpumask_next+0x1f/0x30 [ 3055.833192] ? kmemleak_alloc_percpu+0xaf/0x100 [ 3055.833748] ? pcpu_alloc+0x12a/0x1240 [ 3055.834212] kernfs_new_node+0x18d/0x250 [ 3055.834693] kernfs_create_dir_ns+0x49/0x160 [ 3055.835214] cgroup_mkdir+0x315/0xf50 [ 3055.835695] ? cgroup_destroy_locked+0x710/0x710 [ 3055.836321] kernfs_iop_mkdir+0x14d/0x1e0 [ 3055.836840] vfs_mkdir+0x493/0x750 [ 3055.837262] do_mkdirat+0x150/0x2b0 [ 3055.837692] ? user_path_create+0xf0/0xf0 [ 3055.838183] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3055.838800] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3055.839406] do_syscall_64+0x33/0x40 [ 3055.839843] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3055.840453] RIP: 0033:0x7f371d026b19 [ 3055.840892] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3055.843049] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3055.843945] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 3055.844788] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3055.845627] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3055.846464] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3055.847302] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 18:55:22 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', 0x0) 18:55:22 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x442842, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') chmod(&(0x7f0000000040)='./file1\x00', 0x2) [ 3055.907844] tmpfs: Unknown parameter '' 18:55:36 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x1000095, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1163868, &(0x7f0000000900)=ANY=[]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x5349, 0x0, 0xffffffd6, 0x6, 0x1}, 0x7) mkdirat(r0, 0x0, 0x2) lseek(r0, 0xfa2b, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)={'security\x00', 0x0, [0x4, 0x9, 0x4, 0xdb75, 0x4]}, &(0x7f0000000680)=0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 32) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRESDEC=r0]) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x202040, 0x1) creat(&(0x7f0000000040)='./file0\x00', 0x8d) getresuid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x23e8044, &(0x7f0000000880)={'trans=unix,', {[{@version_L}], [{@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'inode_readahead_blks'}}, {@obj_type={'obj_type', 0x3d, 'smackfstransmute'}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '*]\\\x13\\'}}, {@obj_type={'obj_type', 0x3d, '-#%@\\#'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'smackfsroot'}}]}}) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) 18:55:36 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') r4 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[], 0x30}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd_index, 0x0, 0x0}, 0x80000001) syz_io_uring_setup(0x18c5, &(0x7f0000000300)={0x0, 0xf0c2, 0x20, 0x0, 0x2ca, 0x0, r0}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000280)=0x0) syz_io_uring_submit(0x0, r5, &(0x7f0000000400)=@IORING_OP_POLL_REMOVE={0x7, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x3) chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=r6, @ANYBLOB=',smackfsroot=\x00,measure,fsuqid=75d1fb27-7ab5-2c03-5304-afcb01cf,\x00']) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:55:36 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0xf0ff1f00000000) 18:55:36 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:55:36 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mount$9p_rdma(&(0x7f0000000040), &(0x7f0000000100)='./file0/file0/file1\x00', &(0x7f0000000180), 0x2010000, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000440)='./file0/file0/file0\x00', 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000003c0)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)=0x80, &(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x0, 0x80000}, 0xfff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000240)='./file0/file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[], 0x30}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd_index, 0x0, 0x0}, 0x80000001) r1 = syz_io_uring_setup(0x3a72, &(0x7f00000006c0)={0x0, 0xfffffffc, 0x1, 0x2, 0xfffffffc}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000001540)=0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[], 0x30}}, 0x3) syz_io_uring_submit(r2, 0x0, &(0x7f00000002c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x5, 0x6000, @fd_index=0x7, 0x3, 0x0, 0x0, 0x12, 0x1}, 0x80000001) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) getsockopt$netlink(r5, 0x10e, 0x7, &(0x7f00000004c0)=""/160, &(0x7f0000000000)=0xa0) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000380)={'wlan0\x00'}) r6 = syz_io_uring_setup(0x41ac, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x0, 0x0, r1}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000080)=@IORING_OP_POLL_REMOVE={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r9}}, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000400)=@IORING_OP_POLL_ADD={0x6, 0x5, 0x0, @fd=r5, 0x0, 0x0, 0x0, {0x4300}, 0x1, {0x0, r9}}, 0x7) 18:55:36 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x100424, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r4}, 0x14) 18:55:36 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x200, 0x6) lseek(r1, 0x3, 0x4) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0xfffffffffffffd18, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0xffffffffffffffe6, 0x88, 0x0, 0x0, @uid=0xee01}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) unlinkat(r3, &(0x7f0000000140)='./file0\x00', 0x0) openat(r2, &(0x7f0000000100)='./file0\x00', 0x88000, 0x110) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x200400, 0x0) io_cancel(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5, 0x31, r1, &(0x7f0000000180), 0x0, 0xfff, 0x0, 0x1, r4}, &(0x7f0000000240)) r5 = open(&(0x7f0000000300)='./file0\x00', 0x402040, 0x23) mkdirat(r5, &(0x7f0000000340)='./file0\x00', 0x83) 18:55:36 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000002c0), 0x7}, 0x9240}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid}, {@debug={'debug', 0x3d, 0x1}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x64, 0x31, 0x66, 0x62, 0x32, 0x37], 0x2d, [0x37, 0x61, 0x62, 0x35], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x35, 0x33, 0x30, 0x34], 0x2d, [0x61, 0x66, 0x63, 0x62, 0x30, 0x31, 0x63, 0x66]}}}]}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f48175737465642e00"], &(0x7f0000000400)=""/19, 0x13) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local, r4}, 0x14) [ 3070.749181] FAULT_INJECTION: forcing a failure. [ 3070.749181] name failslab, interval 1, probability 0, space 0, times 0 [ 3070.751972] CPU: 1 PID: 12595 Comm: syz-executor.0 Not tainted 5.10.234 #1 [ 3070.753609] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3070.755389] Call Trace: [ 3070.756008] dump_stack+0x107/0x167 [ 3070.756813] should_fail.cold+0x5/0xa [ 3070.757636] ? kvmalloc_node+0x119/0x170 [ 3070.758520] should_failslab+0x5/0x20 [ 3070.759346] __kmalloc_node+0x76/0x420 [ 3070.760190] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3070.761250] kvmalloc_node+0x119/0x170 [ 3070.762101] simple_xattr_alloc+0x43/0xa0 [ 3070.763007] simple_xattr_set+0x75/0x610 [ 3070.763902] kernfs_xattr_set+0x50/0x80 [ 3070.764808] selinux_kernfs_init_security+0x26d/0x4c0 [ 3070.765932] ? selinux_file_mprotect+0x610/0x610 [ 3070.766961] ? find_held_lock+0x2c/0x110 [ 3070.767843] ? __kernfs_new_node+0x2ad/0x860 [ 3070.768807] ? rwlock_bug.part.0+0x90/0x90 [ 3070.769788] security_kernfs_init_security+0x4e/0xb0 [ 3070.770890] __kernfs_new_node+0x531/0x860 [ 3070.771818] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3070.772864] ? cpumask_next+0x1f/0x30 [ 3070.773686] ? kmemleak_alloc_percpu+0xaf/0x100 [ 3070.774692] ? pcpu_alloc+0x12a/0x1240 [ 3070.775535] kernfs_new_node+0x18d/0x250 [ 3070.776422] kernfs_create_dir_ns+0x49/0x160 [ 3070.777397] cgroup_mkdir+0x315/0xf50 [ 3070.778230] ? cgroup_destroy_locked+0x710/0x710 [ 3070.779258] kernfs_iop_mkdir+0x14d/0x1e0 [ 3070.780159] vfs_mkdir+0x493/0x750 [ 3070.780947] do_mkdirat+0x150/0x2b0 [ 3070.781730] ? user_path_create+0xf0/0xf0 [ 3070.782635] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3070.783802] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3070.784937] do_syscall_64+0x33/0x40 [ 3070.785742] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3070.786049] tmpfs: Unknown parameter '' [ 3070.786847] RIP: 0033:0x7f371d026b19 18:55:37 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0xf0ffffff7f0000) [ 3070.786865] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3070.786875] RSP: 002b:00007f371a59c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3070.786895] RAX: ffffffffffffffda RBX: 00007f371d139f60 RCX: 00007f371d026b19 [ 3070.786905] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 3070.786916] RBP: 00007f371a59c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3070.786926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3070.786937] R13: 00007ffe456847af R14: 00007f371a59c300 R15: 0000000000022000 18:55:37 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x123440, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) r2 = openat$incfs(r0, &(0x7f0000000040)='.log\x00', 0x40440, 0xe2) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x400100, 0x9) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') 18:55:37 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x100) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x280, 0x10d) 18:55:37 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') 18:55:37 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xa094, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_fd(0x0, &(0x7f0000000200)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="2c76076412cfb5", @ANYRESHEX=r0, @ANYBLOB=',dfltuid=', @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=r3, @ANYBLOB="2c736d61636b6673726f6f743d002c6d6561737572652c6673757569643d37356431666232372d37f8a0a4e4326330332d353330342d61596362303163662c00"]) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 18:55:37 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x100000000000000) 18:55:37 executing program 7: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = openat$cgroup_freezer_state(r1, &(0x7f0000001540), 0x2, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r2, 0x40189429, &(0x7f0000001580)={0x0, 0x81, 0x9}) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r0, 0xf504, 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000100)='./file1\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r6) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r7, 0x200, 0x70bd2d, 0x80, {{}, {@val={0x8, 0x3, r8}, @void}}}, 0x1c}}, 0x4) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x60, r7, 0x100, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0xf28b, 0xf}}}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0xb}, @mon_options=[@NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @broadcast}], @mon_options=[@NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "dcc1294d5f9e4bfc4fd0f00248accdab835aa2b61d233a8d"}], @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xb}]}, 0x60}, 0x1, 0x0, 0x0, 0x20040000}, 0x2040081) setresuid(0xffffffffffffffff, r3, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), &(0x7f00000004c0)={0x0, 0xfb, 0x1015, 0x2, 0x94, "8c3625b760e0385baeeec7e1a5c6cfa9", "bcaed8fa11c719217bcc5a26de78ff3b8fc0a5afc115d72e2bc4f5f7e4e1083faf80aad4733143fdea87db0af5984d60752f79a24b9b0509f0d4e3327ad9c6239e81aa7745f4d538bd38586977155f04d921e59df4859f7420801ca605f5ade194241e268d44704b1c4bf5eadbb4a0a76044395abdd29f87d5912b8411e7bf3576192a9db9c11a2c311241d96e509ec14e05eba1fc275d404167d5c103f0c290a9a9d95a4e19dea807c7d24d45c8cc93d5967aff7ca3ad3b17690a66192485f8fecc5e724f0767df413923ebafb1bba3947e0bbac5f30945cc78cf162670d1bf6a3ddbe9d31c68dbc5752022118624d85ffe78a5826c02ee6166d9cc734308ff058adac99c16fac5e7577bf53f3fc7f2321e235172bce66fc3b3b71596d8a4614ea3b19b3b14b79bf215f92e21d94bb05e0e543c75a2c2826f254c4044bf99af970d8892a125f84aee6ccf4bffbd54bb2e88dd9d3232f34ef28c6eb3a473d36b52494807cb995ae3dfcf78f1e27d14565ebeee3b56db8f7d249ef8f29374f7f19cd3a44429c2ea56210b02a260225d9053611aa818dafab1d8fd383b400c65428af76020dd16f107c28adbb88bc9048656c9521f27a855f7dfff751fa72f62283813153c010b22cf59f4279377e885eacfc79e460d78a642a8cb9d93fcc8dd064be2ac63913653de774a44b5680709606fe94bb4cc1fa27f7d8dca5b711d270130a2e934996fba4492a918da493718b1037114eca2e8051c357f7815de13c16b8782c2a8bbca6945275c606618639553547bc59cefa2d9a907857914389c007f7ad1143c996755f04e1a7bfd31d1f5bf67f7eec0ee5013bf2b94339ef543ad116a0782ef654c546e1a4cb24c2ca4ae622bf8f90a1da3c886a8d5c75dd2eabdc4d60992626d9ad97904ffa8ee8ae1d46c201576f0df2eccda2b043d7d7b2645fc11fdd85f9dee12b7e93167af50a0103f636f9555a67c8b1288df31e0ad39ab99ab74f0df6397f37242d5e950d448d6c36c716ed30fa192f8608479387a371efc03fa64570727a5d854eaa50be49a892b0c3683a88aee7695464c0b47a52b98b20a494399cdabc7a94650da0f233db0fc97aaa165d846aad1ad9c0f31fece30177d62e364f409c74756596a28c699b756ea923d889bc50f36bef67386d6e922ff912f6498b8587e9f1f28a78b9b5c75607ef27697a99c55b75628e7ef4039d0fb4941c08ad6e816fb17a78a72ddbc36e02f8d59f5ab4bbb1721d1614825d005fd06dc94341ed53eba9ba203e8361e9b1bd22b460804301c489e5140edad24916b7aa8a81815d878ba47fa503d3bcfe27484ee9b0a92903c054357e40b23230b6388ac7761ee01606be100d0135ec28f095799b047bbf31418103bc77dc5cb39739611b59796f9f8b3036326d95bd8c7715d1da37d3201d87dd58d25e5184add14236c5760bf7cf5392021049711aab2ee7c5c686a4223a2a7a8bc6f823f8666e910ade6a370fb1603c6d52f871984b800de1ca8f1dc9a4c6f12f3ec66f1a4a0023996f6cebeefa4878003acdc8de04a92e9dce431b85bd7fb2ce98319a8c25ea5026727100663e0e8606e02302758ebd46c5d2e6273dc054b7a90bd68869f28bd62f23614bf1591e27481387aabbb245a78cb7984d6f87f454015b63b84379e15ece767e06f5a206b631a4e71bea3e3f862686996692998a44e7a984581e8e14d7b06dd0057e6fe5752f6a410afd186375c82b79504b6870840a95ea3fe1b866513eafb1ee1946d1918b829515e99385a880d0295c662d323b841e1a200a0d4d86f357d406b44b9c2ae3c3d758528894184b9c2fddd4a8e7d185102b2d0bc445d626c3ccc023695e47c920d44ca1649d35a7e80f64402f377883f0daabe3780bcfa4373b0188173a059b7ffd0017bcfad39bc3f80bc3584ead38c4b5108259355db2d76b1dc7f041e4b06f9a75759bff54fa4cc0056b0358e85709f01ff576f693650c2236c3b235ba5e5b883013ef6124f9f7ad1dacf4b4fd9e8070f64cebbb589dd6332dc55979e6de7a05198f9971c08627f107dc51176934a0a8eab8f9e2c3a23f3407f7f24af4bd8ed7601b7c810dbd4fc894c12fe2029b43fcae1b5cf8c13f0b6d56a427123aa439194c29a36599059f2004efedd0b6a58a5d775ef04b2033025176d3f1c1a1d087e1c71e31459c60a400fd0a74afd1a93486099918b12eefb1ab0fe3db5707ee96560755fc59bf613b4f7bf174ea51f440fd20f0489e0e4101617ef3db6f7dbaf19698385a9ddd99dc0a5b2f1ff492e7f9d171bdf8ff31a901dfefdb16fa40cd8235cfcba140fb24498b8d47e27addabb88392dbd43cfa336473dfb6db4fc64b5f7b985b7584e85df419ebdb8ab354f914caa28a1402fa8456d39c07e56cc5385c595efae60a4926d0e1c8db450c388f1014914f69e9a84307285745dae71e5967a31e797630b8a6986671c84cb9f400841741529742a0311e9bb9eddf573a1612eeb86050f47578d748ccde988b138617f16cc60af2241f839625a6e694026b9ca647a59e8671b6dc78e4105e36b95b64e00045330905fa40b97f6cffe9cf3bfa4f8321fc8e794a5901f678646f619dd8d637bfcc5d886f231958c2d30665e49956e6b475e12ede7a6dd79c3606e38bc511a09585e181356de2bea6bb4ae856bf42340a42013addc8efa498b2f88f60e8bf4184018777cee119aef6963a33fe8ff534f77919e4e242c8c3fefe43d3b7260b6f106735291f98f5a20315905ed4f624e25f84f7aece8c6296e456829589ed7cdbb82033cd1081fea9b92d29cca829858a2d4ecee3e5130c936aaec34e28497798956009a5b4d8cf2a240e07084f98c42b20c3cc4ca7de2c38aea2dcf5ca97192b941bb9924bbbf50e26587f699d8b21810637db885c009b6286be4fd8a304776f31885238b0ead460e65b52f44832c4fb7cc630b655c2d57aaf5ef2750328985ae01abdcd84a7bfb62d8a9f03aab7150fdb156553278f27f9369389bbf04200b5d70fa624312ff131c96de7e77b7d8c3fd1eb125235366afd33568ce41cecc8eb4cbb70e0fc78c8d38fffbae715b6f0054dedc0f8a30e6d1b13d0f83e74fba0e57d95775ae653b1bcaf6e6c0ed55dbe43b9ae34df0529f414c1f7a87848a677d2db4eb690a0ae6c3dbddea75027cfad388cf92b58169c1f469c340ad5752bbc616e6a38f24868e2c37eba651e9da3e1c31e1a5867a9deb4aab4d763002d1a3b4e4f33be40a37b7a341e1b68054213e614119e54d0733d74c05322810e79a21c70faffd01e8f8467d14d6ddc99304622e0d5624108d1175cacada04f53785f742792cf7671d4f17cc34a06990897f1d0f8bbe4903694cd749e4ea8ae251bac13db0add3984d6bdb4dedfdaa5f5489689b6446d815cf0aa14019ff027334c5b7dd162eaf11c92eeb5d7ed2d15c8de5c7feae7db34bb4a0e7f4147ef6158bffbeeafc19b76201bbc673fee2a46dcd7dbd2656b6eb445d5442b5df2a651f7c3f70e43c9ab2f7a4ce7d89ad00cd00f279ada7224ec898459904304e0a65e0848d711214a0460fa49204b05dcd667f9656a60b3da784f2b35013ce1b1c28e2c34a902f22a534367f0af80c7b0452637f651fc8ac336d28cdd06125e8aa0b0f1e2ceff9e44556b755271e73dfd8cef29280f3c49bfb9d3c5219c17d28010ac04e2b7eec850ef17f5d1a04180aab4a88efc4c8aa4eb5f0c1e50012a2b6626fc53afb12d75146586ebe299db9ae6ce023ba04d2d2a12e655958562203b9d2fa34909b005bb4ea6963247d51b0a5cf2e46f760156faa7a3a146df78596526dfa228f176b75005a598b962f9b49cdbd6e30c0fd4fbb9c536fe9dbf43b5adc377d6371ee891b9751192f575c685f4bbda9dcd754026d03eebfd54b0b7d50be16cf0fcebf076273d95cd760d2273d2f4ab9d73bf38ec5f0f1afd03f8b63b6ed6d514ecf5165fee4951d3358ef6cddc402dc16389e2eccca06f224881e4b442cf68bd6ede6e34d7c989d7832b3933c03d3200d8b180077c876fbd721161b87361f8526454d4609ab3f8bc1c2e145f868cf52f49a8d47afcd2a946b1d4964af6580db4d5a9279ac9d8a9afaf99ca354836ce2c4e6785c53f136945fa19576a2ecd67cc7bedccbe2819f304e519fd436da979c8e39f2ca0eb2d8fbf6749a481c8aa9c566cceea38e9ba1e1576385c3ba36bbfe83a1ad27f7334a5dc3d86d788033579fc0ea813b006970ebbc55b64229578796d2edd989ee617067e839f99c825f4d31dda28e32199cb20088043668fc2390725cf595beb5df2625107748c63bbb255f44d7fade8bdea754b18c06fe629891da1ecc8c77bcb4d0da7a879aa44b0829225855a8836b667cfe97f306a8f944faf67e4f9b8d059b4531e21237e4e24768b3a49bfc2b14180f85a06a25c778559d9f1c7deb5884b02f323e12d5af601591b1153e2abd6a55016114751555e0b3b8e45ab2795a26e00bb267ca5ac18cff8e7b01f0d572409947eee986bf09557abac90e47b1a167dd1fdb8368121dfd37e457ebb9b8de4f1ca358591079b253c7d532b42b9499f1448b63c6577627791ca681387eb484783d8bb81bec752726ec137b5ac5bd53dc2fcfc9441377bafbfc52bb266ded353dd9cbd38c668baa41518e94283eb7fddc93d6c76e8089cdba691db30274610abe1039b2bb40139194f92a56204126b67ade4d9130a5c860da9916f54b0c55a70f0ecdff32d6f0faef08b105f9ad58168759255249a27157670f1409c43e57fd00dff71c92b53974142d0040ee9829c21c06c8dfc52bcddbb4e5a6eb6e6de2e93d19ce628a2e7eb37363f1a8eab46cf787714726e932c15a81d63f8ed24195c6d7bf7d83e41b5e96c55f209c071af04d3bb6941e0f00a1473f7500e10e5c8eba4ca668e09d64ad0b85cc8ad9f1780167ac79b10f75a3752818d3a2228c46a541367bde865c62facbaae6ff6a68b1da0875afd1eb5ab1621813fd69db3937919fd57b5f1e1ae3e8ad949298e1f51938fbe716d5c24826aea734eb17f56116e146997d752d2af34343037668a055af9b583e086dfc8a29b893c5ec99ea41a17c271feac90ae6e7e7f1b76230e8e2259644097f75b6392c7272593d398fa788df71b2395aae56800a6d7af88270ff5afc0ddd27050894da7c742f3a8d4517e976b4a1c35a796ccc29307446c0c4b7fbe49f9e0ef448ea25d2c9bc9c8549fd9237d75d0470df19f0dbbb9f7bcdbede6dcf9b621cf060951cff41de2e12c437034505664a3c358835c71a9cdc141c5efab5136b7bd8a7f373130e20177e9f171c356cbcaedbc5858bf956dcd0b8fdd406a0cb22412d4651b72487cb3961005b3e241ba1bc9dbb7119bbb892cec77723ead9f87df457e2862d00e5e579e9849badf887178b6e2ed3c1d9016e091ecb20f5b0d28a24e13b84a11bbd60aaf8a11f09331496c9c189e90050df7fd967f4b0fef55956eeb30d1e5da1e3ed0a1d5755cf5ad41dd453021cc4d6b4c4e7d261cd5f85bb058801c82ee04dc5d797ab84e56065bb1d16dac048a76b106e5990ad863e9ff092ef558b1f342c04ca8a3b0cd10da3f4ad6c0e261fda1fc2d26da27ff755a9be318356b9818b4842cab38591fc366bd07b5a398215ce90146ede6e015d61c6610b2e2a026056117c0043c8838941e4f22d39de62d57127877212bf68538313bdde04d4c5f847e67a2d1c5f8a3f6acd788a9fc51261af4de9e7ebd5681b4c8b60d236dbadbc1361fa2d93afd5d3b2a5259fe6d5f446"}, 0x1015, 0x1) rmdir(&(0x7f0000001500)='./file1\x00') rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') chown(&(0x7f0000000240)='./file0\x00', r5, r4) [ 3087.576015] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88800dc38270 (size 144): comm "syz-executor.0", pid 12595, jiffies 4297737747 (age 24.896s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 a9 a8 a7 67 00 00 00 00 ...........g.... e2 b9 4b 02 00 00 00 00 a9 a8 a7 67 00 00 00 00 ..K........g.... backtrace: [<00000000a8bbced7>] __kernfs_iattrs+0xbc/0x470 [<00000000a3420330>] kernfs_xattr_set+0x2b/0x80 [<000000007279f642>] selinux_kernfs_init_security+0x26d/0x4c0 [<00000000a8b3d4bc>] security_kernfs_init_security+0x4e/0xb0 [<000000005f0a8016>] __kernfs_new_node+0x531/0x860 [<00000000a14400c6>] kernfs_new_node+0x18d/0x250 [<00000000ecc16e86>] kernfs_create_dir_ns+0x49/0x160 [<000000004650f642>] cgroup_mkdir+0x315/0xf50 [<0000000027425bb1>] kernfs_iop_mkdir+0x14d/0x1e0 [<00000000b9e5ded4>] vfs_mkdir+0x493/0x750 [<0000000068f1c714>] do_mkdirat+0x150/0x2b0 [<0000000094d3b66a>] do_syscall_64+0x33/0x40 [<0000000071da086e>] entry_SYSCALL_64_after_hwframe+0x67/0xd1 BUG: leak checking failed VM DIAGNOSIS: 18:56:02 Registers: info registers vcpu 0 RAX=ffffffff83e7e9b0 RBX=0000000000000000 RCX=ffffffff83e6658c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e7efb8 RBP=0000000000000000 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85678508 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e7e9be RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f1ef2bc6020 CR3=000000000dadc000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=656a626f206465636e6572656665726e XMM02=2934343120657a697328203037323833 XMM03=3120646970202c22302e726f74756365 XMM04=2e2e2e2e2e2e2e202030302030302030 XMM05=20303020303020303020303020303020 XMM06=65747962203233207473726966282070 XMM07=34322065676128203734373733373739 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e7e9b0 RBX=0000000000000001 RCX=ffffffff83e6658c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e7efb8 RBP=0000000000000001 RSP=ffff888008987e70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85678508 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e7e9be RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffc0a980f88 CR3=000000000db6e000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=000000000000000041575b7200000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000