_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) r7 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0x511000, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000000, 0x10, r7, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r6, 0xc0189375, &(0x7f0000000440)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000009, 0x84050, r9, 0x0) syz_io_uring_submit(r8, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:17:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x600, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:17:13 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x4000) 10:17:13 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r5, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:17:13 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:17:13 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:17:13 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:17:13 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:17:13 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x400000) 10:17:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x700, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:17:13 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x10000003, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r6, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:17:13 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r5, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:17:26 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:17:26 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x800000) 10:17:26 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:17:26 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x0) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:17:26 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:17:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x900, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:17:26 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x50, r1, 0x8000000) syz_io_uring_submit(r6, r3, &(0x7f0000000140)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x3, 0x0, 0x45d, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:17:26 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:17:26 executing program 4: r0 = clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) r2 = perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0xd, 0x9}, 0x0, 0x3, 0x85, 0x0, 0x3}, r1, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv(r6, &(0x7f0000001400)=[{&(0x7f0000000d40)=""/244, 0x7ffff000}], 0x1, 0x0, 0x0) clone3(&(0x7f0000000780)={0x28802000, &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000640), {0x11}, &(0x7f0000000680)=""/67, 0x43, &(0x7f0000000700), &(0x7f0000000740)=[r0, r0], 0x2, {r6}}, 0x58) r7 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r8 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r8}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fchmod(r2, 0x42) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r9 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r3, 0x8000000) syz_io_uring_submit(r9, r5, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r3, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:17:26 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x0) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:17:26 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:17:26 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x1000000) 10:17:26 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:17:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa00, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:17:26 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:17:26 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x0) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:17:26 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:17:40 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:17:40 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:17:40 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0)=0xffffffffffffffff, &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r1, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r6 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r6}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)=0x100000) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r6, 0xc018937e, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000000, 0x11, r7, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) syz_io_uring_submit(r8, r4, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r2, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:17:40 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x20000000) 10:17:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xb00, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:17:40 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(0xffffffffffffffff, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:17:40 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:17:40 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:17:40 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x7ffffffff000) 10:17:40 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) pipe(&(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r6, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:17:40 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(0xffffffffffffffff, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:17:40 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:17:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1020, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:17:40 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:17:40 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:17:40 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(0xffffffffffffffff, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:17:40 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:17:53 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0)=0xffffffffffffffff, &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x884, 0x3, 0x81, 0x0, 0x0, 0x4}, r1, 0x3, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='mountinfo\x00') r2 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r6 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r6}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r7 = dup2(r0, r2) fstat(r7, &(0x7f0000000640)) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) syz_io_uring_submit(r8, r4, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r2, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:17:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:17:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:17:53 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x40000000000000) 10:17:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:17:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:17:53 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:17:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:17:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:17:53 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:17:53 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = open_tree(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x100) dup2(r1, r6) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r7 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r7}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) syz_io_uring_submit(r8, r4, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r2, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:17:53 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x80000000000000) 10:17:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2010, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:17:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:17:53 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:17:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:17:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:18:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2e00, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:18:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:18:05 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:18:05 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0xf0ffffff7f0000) 10:18:05 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:18:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:18:05 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:18:05 executing program 4: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0xfc, 0xfd, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x80, 0x8, 0x3, 0x42, 0x0, 0x8d, 0x10400, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_config_ext={0x6, 0x1}, 0x2, 0x10000, 0x309a, 0x2, 0x20, 0x20, 0x7, 0x0, 0xbad, 0x0, 0x8}, r0, 0x9, r1, 0xa) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000640)=""/171, &(0x7f0000000300)=[r2, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r3, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40}, 0x0) r7 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r7}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r4, 0x8000000) syz_io_uring_submit(r8, r6, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r4, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:18:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:18:05 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x100000000000000) 10:18:05 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r6, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:18:18 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x2000000000000000) 10:18:18 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:18:18 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9ded, 0x0, @perf_config_ext={0xd, 0x9}, 0x0, 0x3, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv(r5, &(0x7f0000001400)=[{&(0x7f0000000d40)=""/244, 0x7ffff000}], 0x1, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) io_uring_enter(r6, 0x5e92, 0x8dd1, 0x0, &(0x7f0000000640)={[0xff]}, 0x8) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:18:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:18:18 executing program 7: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x10000003, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r6, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:18:18 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:18:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x3f00, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:18:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:18:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:18:18 executing program 7: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r6 = syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(r5, 0x6, 0x12, &(0x7f0000000700), &(0x7f0000000740)=0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) r8 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv(r8, &(0x7f0000001400)=[{&(0x7f0000000d40)=""/244, 0x7ffff000}], 0x1, 0x0, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x541d, 0x0) r9 = syz_mount_image$nfs4(&(0x7f0000000780), &(0x7f00000007c0)='./file0\x00', 0x3, 0x4, &(0x7f00000009c0)=[{&(0x7f0000000800)="c9c1d9cbfc6f71c91a328e7baeb326fb4830ff1515f6e243782485f8a114b6708500155f0c9bbecf7d3309f7c57651d719d9fe5fdba756d6382ea112ef0b940e7e9db7bd5c4edc53e1d893546511e9abe417f7576abbc2fe7a8df0655d325ace96db3f89b084e7072bba93b23f450af888a2f3365d99e2051411ea093ffef596f90745d36b884e2c7915cbf50e33c9", 0x8f, 0x400}, {&(0x7f00000008c0)="c47715d782d801", 0x7, 0x1f31d287}, {&(0x7f0000000900)="8235aa52ceeb341888830f49b1ab55e8f9a495beb7a69871449de478dc53ee881605de4777c9b3ee53cb546dd2b23e1e12d3563ed5b6ea1455feff64d4863044bd8ac21770ee1227e2dba1dc4c39486d3e6b684be274074fd183", 0x5a, 0x9}, {&(0x7f0000000980)="a7e867a150d4ac42da8253008ae57d5006bc", 0x12, 0x7000}], 0x28008, &(0x7f0000000a40)={[{'KEXEC_INITRAMFS_CHECK'}, {'system_u'}, {'9p\x00'}, {'@$'}, {'.})\\,!\'))+-'}, {'9p\x00'}], [{@appraise_type}]}) dup3(0xffffffffffffffff, r9, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000440), 0x20, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r8}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@cache_loose}, {@privport}], [{@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}}) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:18:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4800, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:18:18 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:18:18 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:18:18 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x48881, 0x3, 0x81, 0x8}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r5, 0x10000000) syz_io_uring_submit(0x0, r6, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB="00000080000000002e2f66696c65312f666964653000"]) lseek(r7, 0x5d, 0x3) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r8, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:18:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:18:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:18:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:18:31 executing program 7: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x3, 0x0, @fd_index, 0x1, 0x0, 0x9}, 0x3) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv(r4, &(0x7f0000001400)=[{&(0x7f0000000d40)=""/244, 0x7ffff000}], 0x1, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000c40)=@IORING_OP_RECVMSG={0xa, 0x5, 0x0, r4, 0x0, &(0x7f0000000c00)={&(0x7f0000000800)=@phonet, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000880)=""/200, 0xc8}, {&(0x7f0000000980)=""/72, 0x48}, {&(0x7f0000000a00)=""/149, 0x95}], 0x3, &(0x7f0000000b00)=""/205, 0xcd}, 0x0, 0x10021, 0x0, {0x2}}, 0xdef7) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r6 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r6}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x1d4f, &(0x7f0000000640)={0x0, 0x2ed8, 0x4, 0x1, 0x329}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000440)) syz_memcpy_off$IO_URING_METADATA_FLAGS(r7, 0x118, &(0x7f00000006c0)=0x1, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r8, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:18:31 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:18:31 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv(r4, &(0x7f0000001400)=[{&(0x7f0000000d40)=""/244, 0x7ffff000}], 0x1, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x300000a, 0x50, r4, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r5, 0x10000000) syz_io_uring_submit(0x0, r6, 0x0, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r7, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:18:31 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:18:31 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:18:31 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:18:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4c00, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:18:31 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e3, 0x40) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r6, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:18:31 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:18:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6800, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:18:31 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:18:31 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:18:31 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:18:31 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x541d, 0x0) ioctl$AUTOFS_IOC_SETTIMEOUT(r0, 0x80049367, &(0x7f0000000140)=0x4e05e9fd) clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r1, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x3ffd, &(0x7f0000000080), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r6 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r6}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x300000c, 0x10, r2, 0x8000000) syz_io_uring_submit(r7, r4, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r2, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:18:31 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x41, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x3, 0x0, @fd_index, 0x1, 0x0, 0x9}, 0x3) r6 = socket$nl_sock_diag(0x10, 0x3, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f00000006c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x3, 0x4004, @fd=r6, 0x7, &(0x7f0000000640)=""/95, 0x5f}, 0x5) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r7, 0x541d, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000440)={0x0, r7, 0x2, 0x573, 0xe, 0xf61}) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r8 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r8}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r9 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r9, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:18:31 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:18:31 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r7, 0x541d, 0x0) fcntl$dupfd(r7, 0x406, r6) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r8, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x4, &(0x7f0000000080), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r9, r10, &(0x7f0000000100)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x6}, 0x0) syz_io_uring_submit(r9, r3, &(0x7f0000000440)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000140)={0x400003, 0x48}, &(0x7f0000000240)='./file0\x00', 0x18, 0x0, 0x12345}, 0xfff) 10:18:45 executing program 7: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x41, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x3, 0x0, @fd_index, 0x1, 0x0, 0x9}, 0x3) r6 = socket$nl_sock_diag(0x10, 0x3, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f00000006c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x3, 0x4004, @fd=r6, 0x7, &(0x7f0000000640)=""/95, 0x5f}, 0x5) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r7, 0x541d, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000440)={0x0, r7, 0x2, 0x573, 0xe, 0xf61}) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r8 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r8}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r9 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r9, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:18:45 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x8320, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xc, 0x810, r1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./file0\x00', 0xa140, 0x1) io_uring_enter(r6, 0xbfb, 0x5efa, 0x2, &(0x7f0000000440)={[0xffffffffffff1375]}, 0x8) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:18:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6c00, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:18:45 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:18:45 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:18:45 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:18:45 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT2={0x1c, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000000140)={0x4c0821, 0x138, 0x5}, &(0x7f00000001c0)='./file1\x00', 0x18, 0x0, 0x23456}, 0x7) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x100000e, 0x13, r4, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r5, 0x10000000) syz_io_uring_submit(0x0, r6, 0x0, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r7, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:18:45 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:18:45 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x801, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r6 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r6}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r6, 0xc0189375, &(0x7f0000000840)=ANY=[@ANYBLOB="d8675bf83142dcf76ec68a6d33f2911ba9e1ef8a8bab2b5ac502f436f43bd8f03fa71238d56fa99d7c80f76d78dd8afe20cba5ef70569e8d401e6a6044487dc1212d9b66be158399cdff77cba73103c3698b146a90373c3dd9ab934cab9a52706c21ed7f5ba1a0cba9cfc3d753e3ed63223e0d8d167db35860bf516e1187744bf909b2836eaf57725a32286c41fff8e923e6f73cd67915620c8cf88a7a68cc61f868d5f2ae2f14f5e190d85d26a3d122066d1370008944a6bd53d5bb2b0c4fd0e868bb85bba408e6820f775bc0171a399600", @ANYRES32=r7, @ANYBLOB="1c6c653000efff0003"]) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r10, 0x541d, 0x0) r11 = open(&(0x7f0000001a40)='./file0\x00', 0x2, 0x0) io_submit(0x0, 0x5, &(0x7f0000001ac0)=[&(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x9, 0xffffffffffffffff, &(0x7f0000001b00)="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", 0x161, 0x1ff, 0x0, 0x3, r6}, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x9d80, r9, &(0x7f0000001c80)="a1b7a2bb3b79be39ac5f3b721c380724929a1699da3e7751b37a92bc6df3d9f00e41ac87405dbf0574a84037470ef42fc0621bd3c9497f3698c8eeffd8f6bba6193a8d5cd688681463da90b608aced719ebfc2a079dff83455c5290d0d42767d3a8927f89f7e322a0c3999d8db768a100c2f87704f934a69c7552f0cd664bbc750f6fcc35320c308eeab11ac120b0667e72faf74b5e82d83c572f9689d87009c4c2453aa996060ae35142c7a16737a413dca625049e1283e83b8645662877d8d656abd5fbde3c39ad9c5f5bbfcbec68a86a7a7bdba8661bb1dca51df31a8a15f7b2bcfe07ccbad44fc50fd81e38d13e0eea42d35a6fd2be617ff6d2d58a5e1142e8015f71886587332ab73f832a38ceede2fd87cad0f33f85a0bb925d491f46672beaf10a161bcf2b61d7690c6bebe127cb5088dba9b44728ba49d69c6f30e34407c9ac1826870f07d5caf5024e66d473f8e5838b8fc5188f23c0bf458639dd649377b3918c7466c311edbdbb9d83b097fa4d73fc99ccb895fe1001bea02a9041d801364eb66109e3c78e45989126aa8f34ccbfd2e4e3062874d23f1717e338827f573f4835844282832a34a561df423b46a9e95622d45d14260c3e9a3cc580dc832b770ea5c4bfb81ae1407da729b792ea7b0f822652d569a1d35f7afcf6137cd2662a0d74799f322489728f606bb0bea8ea919cbc5e61c461936c402b95c1d15bc1ceccf558d311584cc52b3d2246ae1624bb5157c8d49c2e24ef7664efd96ed47d232d80d1df333c1c81a0b672ce954b9ededab0b699b72dce197101ee3226b0bd2d8e2e2fd53ca915a5b961c5f335ab13ea8d71732cf3b977874c000850fffe14993b17636fee72eae272d60872f7060d056779018fae6c3db49ce93c8494b2b2c189d88a13f329f194729df316a673853ddae6b9da9662a77bd4f44b883e280a9a1859662933c18042c9e5ff0d247ea95edd37c8d99ee523fb08ccc9b2eacdc633e149457520bdb399f602edc643c4fa3060335c61351b1baea6b953aeb702b6b0318e56e1b01abc94702b53649677c9a188905cb5f651bb134aff7a308303e39427a2b741c3073944c387dfa9ae7770c65cdf89311e979da2fda315f89d59ec10999d917670eb89d4bb52dd9843d94048cb839c93abe85a0f9c3adc7a715239a6ab9584f65ec6f5ec52523fed1c7984079d50ec9155337bfb20177318db46fa8572e2f8b647baf8faa184dee633fd85ef6a3e56f9009a05383b921c6faed1f7071b83383cf185c54a1078ca545ff53b8e7b4e1fb2ce3cf08df3b381472e601fad6451e5b1a05167a9ca4bd8cf8123bb8629ed71e55d0470c5c903b353a09c324aeb419e8beb7c92df889c7d61ad2841c2cdadf1eb6340cf623a10a33fae550b48e6c14d3028b360a44fdd53d2d383c2999524948f569259d3bc6363d5e3eda711e70cd2df39109650752a31a5773cfd49b6fc0fdb67df45d3719908ac2cc9ee7f7c219f415c0fe81b4a176ab8e318597e46ec62fb18443af4c1b1764a6aaa035dbd4522deb8355ae97ff7fb8b236be3d6530a075967e2234607e8241148ee38410ce6340df99208a738425e213efff25bed3bb794d46caa6f6f916e3dcaa110a3604c0d9a351d1ba5eebe60a1ab4db0d1c7d21cff5abf9f465bfeaaf1050d12c9bc9b135c5be3e2b9efc9a6c6e2325a9d1ed77ee97b27d8b3b9c29cc8cd95bcf6ad8d4d606837f6f39bc186aa59ad91a9c3ecd13ce829312fc8b52112146fe9db9b47b1f51564d531f03d3749a32392d62f90abd3a2c03f35a89b65920ade1ddaf30b4dd840e6d523c9bb7088548d4c7449afe661b46d0baf2d4edd2c734d60de930c7120991b693bd66f5f5c6116fa5eb2c882c45c67ae9ed4adb611cb99c89afc9dde2305d4e8bb2025161cc2345b8bee09fb19206348a5d8fa287e9f07000b891a4bca60a136f6cde781c298b9a49510962752a59744f64a5e4aeb7b1b109be98ea238705e3165c23d29a2170ae9ec370cdfb9828f2cb7d0bb28e203e4e46c675cd87bb6409be1989bebc77a8914b02aa93c688fc7df12c162d2820decc7cd80178db6a464128a3898b8d0b64385272504864dfa6d703295b831358c50b4bd2d0c19c2b2bd6341a8931971075ffe5519aafa803215e2c8e5817455b9b2d0f72815524c351a79f981716ae6c5b66437c864f0aadcc1ac9e377d0f212486c827c5d82bc1ee474c943b9aa08a44c5002e8c84f7e461587da35c799f0db16c5fe1200008ab87bd1bfe6c388089a58e336dbf811d34b56fb8a52e93faf9fa69463298b0e93439c6c3cdc01aafafab8c50b70788e5a399a674b88fd683ae8c873920b6afd773528da29f0da5072df3d49957885c79ca8cbb5303174887945c1a68a72159db97eedd689cafdc465c5df7cb37666ea6406de986a3c9bcad24a5a2da21966ea7260a887f17651f8401820038b50947ac52234ed3821ba6d67371d6f6e57322aebb6b16136ee0f659ec734d227c9f49fb748241f3cf4053842e8e2a19baf03cf7566424cfd2829c485688045fefcea70ecd641dce33bc2e3a288c82bd11c505c558e2c3c5486fbe2758deb6208c14a71513eb1f7705595cacc4ea3e909b664e8a0d49368a7de093c3323144327f81cbd3ab7bb6f2c489d1da9b67b35926690d696e1b8a8372509f2c5f8746ed9fe27f229da14565e10cad4722ed1c6ae3c388b98ecf02e25b17ef32e4b586d5fbe9497433eb011c873cb3c6c2c7cc6f85f5567f8f9f657673283d5549c8a7a646b12c730c0b27734196d84ae5535e034441b23906e194d0548b4b7f45ee5a47eab7cdb14cbd5f7eb965a00b0f2ca2ac2233ab702cb054a495bf3558ed8e6bb32df252ec213a87cdf41a19e86dc167a999c967b5b1b52e339c5b2c1afea7a2da44542c95872e43379135652e56435fd1eff75c6da321869806cc74fef07c01a9d2264b53cfc652f65af090f3b3b983735d883e69d7d15e611f9862ddb414d883aa4660cecc133c0f7fff54e98cf5024b6a94d40818b5e5a08435f4b89051dbfb218b59a8362fc828caef6fc040d64f6eb3680e3100e4ede9918bbd278be7fd3af778bb6d1ad74cb64ed4a6ece4511577f5fbe1e4fbe106ff88bfcd3d6c50fb2a1f17028b24ff581aa50713275fb31eea4f079a60acc2cee5436c3687f661b4150add3765d2bd664d502b1eea0bcd177b0e9a9f4103ca6fee7c6e7cde0ed3b5fa247ead75fce80357cbde46c9a507f712e487cdeacb0ea3247dc0606636559c9f10086fb8139b4bd1fd48f850c0a181c470a2fb42a01f9d5aacb0c976a0667c04db37a3be80f20508a3bd92f870c772f72d04c4f6bed5d9b1e7515a7d66f0ebf0029773a2ec29d51da1732c915bde3e9383d73db732e0e30e821c47bb718154e21a1193a16c2684196ca2601d45130eedc02750b29b09f510887916c89f0706db835a8d222c206bf332ee387201ca7888a135f2c8a65161ba96d2a7e91e389394f9b1df9d60b2e3cb895a8a58a52fba11832c7060a6bf82ca7b443372be96a0aeccbe2a3801f228bff1e0a3597502dc97d88386b624e5afc1553f6e03af92930364480ec33c04e6e72b30254f95cb334bef8afe3d15626e768ff92390925cbe3dd410fad9f5f281e4bb561b45c98458d0e0c2417699b86b905d38c83e3f1af96c8c3e54380fff9e56c05cbbc8934302ae3886a7d06ee5a69ac7d9067086dc8aa0e97fe0f63146a3cddc0139b83ede9a75c96a5d35681a5d6168dd8e2b390eb872e7a07cc4d576287443f73aadfec16344e9667f36d2f2be8ae5e191609946bcd1040b8b1078fe004001196cca72127a6453b1c465037a817b9ba5cbec96ea4e22df0204cedbd250e1b9fbbc24de10740e29ddb9e853465367f17e131aaa712adb9cecd4b6906ed84db9db0474490e056416daff3b2cffdbca3baf183f31624dc40093f0a19d619beea60c2c4254b50a890f463cfab433047f96e86d919080e55262f216132c6d8d038d93207343b136fd456e81979cb4e7c550e1de01b77d9963be282824340ff5cbcb7c22d40b5685f7f71b8f68026fee1ab53d2aba9c594d372ce5fca4c8624d62790ea2bb887dff6f28b76aabf4d46b119e4c77701dcb6daa8e292260c0a3ec4aba612e4edccac32915e2f32cd462d0c5350d6ddb047ac64e7c9d150038d7fb624878da12280c4de9d5d90249e642bff7a16b86d3bb5e127cfbd754b08ed88822eec83727cac57dd20a0cc937afbee0e2fe01a73db633028e1fbd7f260ed76fc00a619b582da95eeb02ed9f6fc0857f60b6d0a3937b5fd988bea3fd2b5b88e30eb8642119f9b9faeefa035c96f2ff2c32c14de53a7af84a044adee39dada80e8dca213102c14a92787ed362bcd2af37f847b105df19f46ff3bb6fa68389c574d9b5f44b4314841571f734ee4d09e3d15b0b297fd2769e69ea4005eebb6cf947094aea8cb085cfa53cb21b13121726e8cd5bac9f450836bbc3801391509e76c91677a98230f466ac5e6ccfafbc293c44498382af6d69c6274f677a2af32c62c99121e0c6012e1728fec5146d73e5df62b34b4ef950eea2ad3759b6cf33808a108bf8eb23c5a255d3dbe7491ccccadc49f0f07ce370267348657276d19ebdd83334da28afa60f1977ebe48ef45228cd6255a1abc224aeea8a62e68dfe085dc0d5807a239b15b5e5b43d3a73090095dd047eb47440b80447dcc9e10ec2387953d0e62e8d72c35aeef673e204b736e40100000bdd4beb83ec263f55439a031baaecf1d35c355edd1f5876ceaa9ac373658fa078ce238cb552581605e7d67bbea5d27757277bd487812769307cf0a2fe6168dde1a88c2d316b22083ec83e3f7f943a76607c2fe2f63f23f13201ab2e15764c2a0845bb49be9dca5a8694f3e3cc1ef81fb5b656aac3efce2e6ae6d23d530a7d7ede4cab525a7b5e45d4c1c925e63331ebb1edfa71deee11c5eeb462b417fbabaec8605b31911ff0520509b9dd63b6018ead68324803b410c557e479098f2d2a142faace8bbdfa30ecc4504be8d7e45b0dc876ec01074663d862b0149f2387d92dffe336eb9c0b8d8219d6d6aa3671f76a46dee7d5bb29065d7d0621613ab61e53d11a7197357984e2c7291cf4a35a989b0ba3c276ffa0beb698072acbc5e64c66743814a9e82d36a0415229628ed96adae893c54c51e6ccd1957248241aae5afcff330f22bb4d77c3e390eb918500deb79c8227764b39d75632df60d89534f38a5ff21e5398dfddc41fc19f64e1fdd7ad79f3492588dd492dda0e2459a24f269a03c8695afd2121ffb81060f7d3d05ccef08d885132f2a88aa191e97014f13ae11213485aa15f984d7e6d21b4c5e309b4e0ba76f18c2596623903e86368c018cb2fcf59084931db39c42d08e68d750c9cc77af9b7ecac9cee242e170b2c587e6b99b1620fc6a99c47a44a09215bee64132ef0602a6bb28ed5e79c5da848f44a2a9f20f7977bba327e49519525b3538380a982c643cbd4540f45bdb71afd012b6e1b85c75d9cb59672f3d28a23cc6bc340d528bc5561fc65137a2250eb9af82d4bb10711380fbcd5c3457776ff6afebf6b0d0b104b0e3f299df338e475a4a0bbcba96fde5cc528492fdd0189fbac08aa833ad8c041d04e2225ea25a965d090a3aa14c11ab50a005e70970a8b250ca0b09f77f560e5782e9c5407e6e89f27536487455109a8342931dc7be39394ae2a77770b1a6903a46ffd6297f50215a891f201c49660ddac40155", 0xff2, 0xfe, 0x0, 0x3}, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x2, 0xffe1, 0xffffffffffffffff, &(0x7f0000001800)="f9b9bf1768c2d1239bd1730ff3f259a65ee64cb3e49efb1fbd5e31f976ad5d3aa39566bf6b23733c91c747163ea45f3667b3d1d506c9e999f35c99b813ebce923761389498e11a88d7b9ba6568d1c2c1f575bc9d29783cf0ddc3fd2b3b8b67586998e5e065ce2ba04aa8529dd23e717a43829f62724890af0afed2c73380181951791aab816afa80851e2946e01f5819a3e0f598ecc99a539727d95d73b6ff14", 0xa0, 0x3, 0x0, 0x1, r8}, &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x7, 0x0, r9, &(0x7f0000001940)="71c62e5ba0a86ef8c2796b53ab804fb89593e1e5df6e81ca5be7f82f916a7d2aff5d49a9db0732e7db2e4288a122eb13c363870a78b37ad1cef9d57236a7f01ba809036bd6511a57b6804dadff0ac8522acb73b44cd88f1be80d3837c6891fb45b", 0x61, 0x1ff, 0x0, 0x1, r6}, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x6, 0x100, r10, &(0x7f0000000740)="2e3c8b7c05d8371b7539506a58956c41b51cd97664bfe453051c87f55dfe1d326ad1bc48f2d88cdf56391d7e2080ddf0ffdbf0a45639ea798bacf010e8195b2fbce028ebd604adbfbca422e25061b729f53bf506380e700c41ff77c0c294716beb19c46facc5e55902d54db3695ee01480645ec64d289fcab16b43e05468ddd36bf4c47a30385e7ddb711c663cd4f94e9cac6b2ad6072ecfd58066d61a60540a282ea38177f59d5610324ba5e3c3211a46bca42d7e479d861fc6c3df63fe7e1cf3e555c904a10ecd3d1cb62b3ad5105b1cb326d989465a80f25db0dea6aa90c3197bf943220cb4e2b57ef065408cba7a22ec2b1d5760c0575f257f", 0xfb, 0x5, 0x0, 0x2, r11}]) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x100) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r12 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) syz_io_uring_submit(r12, r4, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r2, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:18:45 executing program 5: clone3(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) ftruncate(r0, 0x2) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r6, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:18:45 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:18:45 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:18:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7400, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:18:45 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:18:45 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:18:45 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:18:45 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0)=0xffffffffffffffff, &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r1, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r6 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r6}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_netprio_ifpriomap(r6, &(0x7f0000000440), 0x2, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r7, 0x0, 0x0}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0xfffffff7, 0xfffffff9, 0x9, 0x0, 0x7ed}) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) syz_io_uring_submit(r8, r4, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r2, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:18:45 executing program 5: r0 = clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81, 0x0, 0x4}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000600)={0x8080000, &(0x7f0000000280), &(0x7f0000000300), &(0x7f0000000340), {0x15}, &(0x7f0000000380)=""/113, 0x71, &(0x7f0000000500)=""/255, &(0x7f0000000400)=[r0], 0x1, {r5}}, 0x58) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r6, 0x10000000) syz_io_uring_submit(0x0, r7, 0x0, 0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) r9 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r9, 0x127d, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r9, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/167, 0xa7}], 0x1) syz_io_uring_submit(r8, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:18:45 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:18:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7a00, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:18:57 executing program 5: r0 = clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)={0x1428, 0x29, 0x300, 0x70bd26, 0x25dfdbfc, {0x18}, [@nested={0x116e, 0x47, 0x0, 0x1, [@typed={0x8, 0x22, 0x0, 0x0, @ipv4=@rand_addr=0x64010100}, @typed={0x8, 0x32, 0x0, 0x0, @uid}, @generic="d91c43d4251920f476235eab19f42903f36755b5146bc522550002df218e9005f4bd2966c4b9417d000df40a107b5e2ea28846b866c472eba8cdefecfe2afedbc60688d9a8a20a62e74594a1029c377d9ac80d737de58b0b6083afd2b55a3cf4c394e64ebc7cf873c8bcfb75e13fd0ca271a0c8e17281887c0bce339ec2117348db2a784fd9002fa2d275f10512a40f36baba33ea66866493773d0583aeb6383ae76912485e9d119147feb4369c702c18016e19cea6ca41af98a678d22b185541c44c4caf5f1ebd6fb", @generic="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", @generic="a63a4642b7252dec5dac1dc60bebbbecfc4bf751a4da4c6fbedccc22e69ca5d701acd1bd0c8341820525267f58cd5e05b04679ecb07332b2f58e9f4d8a3acd8074e6715057204305ee2c1bcc5bcdac08fbf3d55caa12198c28a7ac4cf16bf48c3227378745f5171846344fe2b9f2b6394666449a133c385c090ef907a6139fd8e9", @typed={0x8, 0x1f, 0x0, 0x0, @u32}, @typed={0x8, 0x7a, 0x0, 0x0, @pid=r0}]}, @generic="a53b766ea73b2095e5e8758b04d7bfaea2e4ed151d8b5101757e2faecdee9107695659b90facaeefbe8424b0832f3e097a46968f31d73c8e11e5bf295fd5a4531e3d8d7d8674eff9e80edd044ed66db1807550583e346736884d60015323e172f7b8dded1fc9b7dbd1a376d01048d38f9dea2256505ff24dee10739534c20992601deb0c8643800eb35b0c0b443c6472326dea5aef98594705d4b464df", @generic="48e82b46841c9df5abc5604794cb87773713091f96b5974eed5a50bf8571adb45b537c3d27c2575a3c58220de7b01fd47eadb7a760a079a859fa1471148009a9e072048d15de3168064e69d18ca8b5e106a66c65cd95ee132087938854816ec96c76026953cdf31f089e9268fe41cf4557ddce31fc64d006060f8099cbff8a5dff0834de0443678c5e086bc0e8dbfacfd65178733b674b5ca24d5ece2d6618fd20dc37076e45b0bb1d9ba0944d36ccd01460307b0f71163d3a3ccef3a13a8ea452353c7716551b9bf2ac85dd9de585ddcd9b07fe127236d9fb08edd02f6183", @nested={0x8e, 0x5a, 0x0, 0x1, [@generic="d5856f19c3918b36d5e5d79659a9fd3fe6ae6a1d1e84dcccd559ec8c6aa26bf037cbd160e9836ad281cb5f541ad9b1bdf4b1919362f200066b8d073b293ac90f9c51949350002a7ee9f98064dd7dda28330e2f78a1dcb268eed98c2a1b8cad0900b3ce93e3adf37873862e8988495357fda87411aeb3af6859a2f198253913bb3000", @typed={0x8, 0x46, 0x0, 0x0, @u32}]}, @generic="40ffe3423f6c89a7c40730709ee01d502585730494fe4041e8825fc63f51b84ff489524d7c9123d51a07bad067a0da700c3fac43338540e0ebd3710c8bced8b63007fc26afc7d3ca61e930883f4b590268569119215b53cc2fecee34275416aac162f45d1fb970ff6e6bfe251957ea01028c5472671b2d577ad98d57500e12aac5dec0a537ae4b155360ea926fdd1b003d8f75dacba3bf14"]}, 0x1428}, 0x1, 0x0, 0x0, 0x4000011}, 0x40) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) dup2(r5, r4) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r6, 0x10000000) syz_io_uring_submit(0x0, r7, 0x0, 0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r8, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:18:57 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:18:57 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0)=0xffffffffffffffff, &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x88, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x10009, 0x3, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r1, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_setup(0x1929, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x800000, 0x8, 0x0, r2}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r7, 0x127d, 0x0) syz_io_uring_setup(0x4, &(0x7f00000006c0), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r8, r6, &(0x7f0000000640)=@IORING_OP_FSYNC={0x3, 0x2, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, 0x1}, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000440)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x100, 0x1}, 0x8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r9, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r10 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r10}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) setsockopt$inet_tcp_TCP_REPAIR(r9, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x7, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r11 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) syz_io_uring_submit(r11, r4, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r2, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:18:57 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:18:57 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:18:57 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 1) 10:18:57 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) [ 1776.276365] FAULT_INJECTION: forcing a failure. [ 1776.276365] name failslab, interval 1, probability 0, space 0, times 0 [ 1776.277952] CPU: 1 PID: 10127 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1776.279925] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1776.281066] Call Trace: [ 1776.281803] dump_stack+0x107/0x167 [ 1776.282314] should_fail.cold+0x5/0xa [ 1776.283405] should_failslab+0x5/0x20 [ 1776.283942] kmem_cache_alloc_bulk+0x4b/0x320 [ 1776.285212] io_submit_sqes+0x6fe6/0x8610 [ 1776.285809] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1776.287231] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1776.287906] ? find_held_lock+0x2c/0x110 [ 1776.289056] ? io_submit_sqes+0x8610/0x8610 [ 1776.289658] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1776.291046] ? wait_for_completion_io+0x270/0x270 [ 1776.291717] ? rcu_read_lock_any_held+0x75/0xa0 [ 1776.293037] ? vfs_write+0x354/0xb10 [ 1776.293563] ? fput_many+0x2f/0x1a0 [ 1776.294587] ? ksys_write+0x1a9/0x260 [ 1776.295105] ? __ia32_sys_read+0xb0/0xb0 [ 1776.295603] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1776.296247] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1776.296876] do_syscall_64+0x33/0x40 [ 1776.297330] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1776.297955] RIP: 0033:0x7fa2cf50cb19 [ 1776.298409] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1776.300910] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1776.306995] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1776.309046] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1776.310768] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1776.312783] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1776.314465] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:18:57 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0)=0xffffffffffffffff, &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81, 0x0, 0x80000000000000}, r1, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xd, 0x2010, r2, 0x8000000) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000a80)=ANY=[@ANYBLOB="01002000ff07000018be00006afb475148af5eb452778d59c00d807bc03e59c5086be2260cefa9d1d9d3a231d38d70ae02fe763b4f7332b436b6d8ba08a1c98044386834d6d35e99d79acb749144ef1be98c1cea51d2d47d388eff7612b9425bf6dee1b705b01468716e7f5470360743db63cb5c82de399857c917f4896f7dc4f72a14fb844e282995f97b373bf2fbbc023d64c012fc1be010c0570492f1bc856a51429287b12ba68399814ed28ab7f1137555e93d506c2964ad152d35ddd87cf69ed99d4c12264b0abff619aedc819762dde36c6474eb1857ee03b87cef1caa3348867f89944e7db64aada1ab8a1043", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696c65300081c3757f9f25cd76cc935efcd861a8b89ef2b1d20e337f523b0a1c894130a7baf6af379bc253337e5d881cdecf64743a70eda55686fa4fbcb26377c3f3057d757421a2ffdd4617607587415478f35a3057e65cca94d886bb998e1dafd65117ad33d1aad0617389bed9"]) syz_io_uring_submit(r6, r4, &(0x7f0000000440)=@IORING_OP_WRITE={0x17, 0x2, 0x4007, @fd=r7, 0xab, &(0x7f00000006c0)="bbf4e50dd7217f35a46d6755c16eba97cf4593ae39a84cfdcf6497e668dd4808a339c36fc5426d2683ea476c21cea253eba7ce9ea004a48cb5ceeadd17954fb0ad9fe9da27bbce9dfba3e4cbd7a068b291548054781e77cfedcd6b73a09be9785c9901fef37aaa8ae6bdaea22ad325d53545ec5ec504ea712414c5ce3691a612bcd116411208e6a5f1bdda47a344747a8d5d4ad2864a9da5738fb9b1288702943a7e8ef016e02f1b194927adaed1b1d8e8d8e856797dd5818c7cb00552750375dce86c7dd7e6bb8a7366", 0xca, 0x9}, 0x6) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r8, 0x127d, 0x0) renameat2(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', r8, &(0x7f0000000800)='./file0\x00', 0x4) r9 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000640)={0x5, 0x80, 0x91, 0x4, 0x1, 0x8c, 0x0, 0x8, 0x6000, 0x9712c1f5fa8ab7ed, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x58b345ed, 0x1, @perf_config_ext={0x2, 0x6be}, 0x408, 0x800, 0x1, 0x8, 0x6, 0x6, 0xd2fd, 0x0, 0xfc4, 0x0, 0x7}) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r9}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r10 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) syz_io_uring_submit(r10, r4, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r2, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:18:57 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 2) 10:18:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xedc0, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) [ 1776.463759] FAULT_INJECTION: forcing a failure. [ 1776.463759] name failslab, interval 1, probability 0, space 0, times 0 [ 1776.465227] CPU: 1 PID: 10153 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1776.466061] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1776.467074] Call Trace: [ 1776.467410] dump_stack+0x107/0x167 [ 1776.467852] should_fail.cold+0x5/0xa [ 1776.468315] ? create_object.isra.0+0x3a/0xa20 [ 1776.468870] should_failslab+0x5/0x20 [ 1776.469332] kmem_cache_alloc+0x5b/0x310 [ 1776.469826] create_object.isra.0+0x3a/0xa20 [ 1776.470360] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1776.470987] kmem_cache_alloc_bulk+0x168/0x320 [ 1776.471569] io_submit_sqes+0x6fe6/0x8610 [ 1776.472092] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1776.472698] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1776.473288] ? find_held_lock+0x2c/0x110 [ 1776.473786] ? io_submit_sqes+0x8610/0x8610 [ 1776.474318] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1776.474908] ? wait_for_completion_io+0x270/0x270 [ 1776.475518] ? rcu_read_lock_any_held+0x75/0xa0 [ 1776.476083] ? vfs_write+0x354/0xb10 [ 1776.476536] ? fput_many+0x2f/0x1a0 [ 1776.476979] ? ksys_write+0x1a9/0x260 [ 1776.477444] ? __ia32_sys_read+0xb0/0xb0 [ 1776.477941] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1776.478580] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1776.479237] do_syscall_64+0x33/0x40 [ 1776.479691] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1776.480313] RIP: 0033:0x7fa2cf50cb19 [ 1776.480766] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1776.483009] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1776.483956] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1776.484823] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1776.485689] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1776.486554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1776.487443] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:18:58 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x80003c4e, &(0x7f0000000500)={0x0, 0xb235, 0x1, 0x20000003, 0x1b9}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000200)) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000100)='veth1_macvtap\x00', 0x10) io_uring_setup(0x3fbc, &(0x7f0000000400)={0x0, 0x4b9c, 0x2, 0x1, 0x2da}) syz_io_uring_submit(r4, r2, &(0x7f0000000280)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x6000, @fd_index=0xa, 0x3475, 0x0, 0x0, 0x3, 0x0, {0x2, r5}}, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x40943, 0x25) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r6, 0x10000000) syz_io_uring_setup(0x37ff, &(0x7f0000000300)={0x0, 0x6415, 0x4, 0x1, 0x2ac}, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000380), &(0x7f00000003c0)) syz_io_uring_submit(0x0, r7, 0x0, 0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r8, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:18:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:18:58 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:18:58 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:18:58 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:18:58 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) setsockopt$inet_tcp_TLS_TX(r5, 0x6, 0x1, &(0x7f0000000140)=@ccm_128={{0x303}, "b2f8cebe7f9f0aba", "3116fdb6bf57a8ad175a6fb66c557384", "01568879", "7c319d331a22eb79"}, 0x28) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r6, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:19:11 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:19:11 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 3) 10:19:11 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:19:11 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:19:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x80000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:19:11 executing program 5: r0 = clone3(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {0x959}}, './file1\x00'}) r2 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv(r6, &(0x7f0000001400)=[{&(0x7f0000000d40)=""/244, 0x7ffff000}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x34, 0x3, 0x8, 0x81, 0x0, 0xfffffffffffffffc, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f00000001c0), 0x4}, 0x2080, 0x101, 0x0, 0x6, 0x5, 0x3, 0x5, 0x0, 0x4, 0x0, 0x1}, r0, 0x1, r6, 0x2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r7, 0x10000000) syz_io_uring_submit(0x0, r8, 0x0, 0x200) r9 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) syz_io_uring_submit(r9, r4, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r2, 0x8058ab, 0x0, 0x0, 0x0, 0x0) [ 1789.997512] FAULT_INJECTION: forcing a failure. [ 1789.997512] name failslab, interval 1, probability 0, space 0, times 0 [ 1789.999032] CPU: 0 PID: 10188 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1790.003893] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1790.004901] Call Trace: [ 1790.005252] dump_stack+0x107/0x167 [ 1790.005697] should_fail.cold+0x5/0xa [ 1790.006163] ? create_object.isra.0+0x3a/0xa20 [ 1790.006719] should_failslab+0x5/0x20 [ 1790.007182] kmem_cache_alloc+0x5b/0x310 [ 1790.011701] ? mark_held_locks+0x9e/0xe0 [ 1790.012200] create_object.isra.0+0x3a/0xa20 [ 1790.012731] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1790.013349] kmem_cache_alloc_bulk+0x168/0x320 [ 1790.013909] io_submit_sqes+0x6fe6/0x8610 [ 1790.014432] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1790.015036] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1790.015661] ? find_held_lock+0x2c/0x110 [ 1790.016162] ? io_submit_sqes+0x8610/0x8610 [ 1790.016695] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1790.017287] ? wait_for_completion_io+0x270/0x270 [ 1790.017876] ? rcu_read_lock_any_held+0x75/0xa0 [ 1790.018446] ? vfs_write+0x354/0xb10 [ 1790.018900] ? fput_many+0x2f/0x1a0 [ 1790.019349] ? ksys_write+0x1a9/0x260 [ 1790.019832] ? __ia32_sys_read+0xb0/0xb0 [ 1790.020329] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1790.020973] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1790.021604] do_syscall_64+0x33/0x40 [ 1790.022056] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1790.022680] RIP: 0033:0x7fa2cf50cb19 [ 1790.023132] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1790.025388] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1790.026317] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 10:19:11 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:19:11 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140), 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000059140)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000059340)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1f, "f703303fd21e40"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000005a340)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005b340)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b540)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6, r7}, {r8, r9}], 0x6, "1eadb197d6d01e"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000051740)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}], 0x5, "67f2cbd3afd4f8"}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r10 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r10, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) [ 1790.027190] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1790.028076] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1790.028945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1790.029813] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:19:11 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r6, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r7, 0x541d, 0x0) write$binfmt_elf64(r7, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"/1515], 0x5e8) 10:19:11 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 4) 10:19:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1000000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) [ 1790.182887] FAULT_INJECTION: forcing a failure. [ 1790.182887] name failslab, interval 1, probability 0, space 0, times 0 [ 1790.184552] CPU: 0 PID: 10221 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1790.185490] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1790.186628] Call Trace: [ 1790.186992] dump_stack+0x107/0x167 [ 1790.187514] should_fail.cold+0x5/0xa [ 1790.187976] ? create_object.isra.0+0x3a/0xa20 [ 1790.188528] ? create_object.isra.0+0x3a/0xa20 [ 1790.189085] should_failslab+0x5/0x20 [ 1790.189547] kmem_cache_alloc+0x5b/0x310 [ 1790.190041] ? mark_held_locks+0x9e/0xe0 [ 1790.190534] create_object.isra.0+0x3a/0xa20 [ 1790.191066] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1790.191711] kmem_cache_alloc_bulk+0x168/0x320 [ 1790.192273] io_submit_sqes+0x6fe6/0x8610 [ 1790.192793] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1790.193404] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1790.193990] ? find_held_lock+0x2c/0x110 [ 1790.194488] ? io_submit_sqes+0x8610/0x8610 [ 1790.195018] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1790.195620] ? wait_for_completion_io+0x270/0x270 [ 1790.196208] ? rcu_read_lock_any_held+0x75/0xa0 [ 1790.196772] ? vfs_write+0x354/0xb10 [ 1790.197224] ? fput_many+0x2f/0x1a0 [ 1790.197666] ? ksys_write+0x1a9/0x260 [ 1790.198127] ? __ia32_sys_read+0xb0/0xb0 [ 1790.198625] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1790.203525] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1790.204155] do_syscall_64+0x33/0x40 [ 1790.204613] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1790.205235] RIP: 0033:0x7fa2cf50cb19 [ 1790.205688] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1790.211955] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1790.212884] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1790.213747] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1790.214615] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1790.215490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1790.216357] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:19:11 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:19:11 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:19:11 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:19:11 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:19:24 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:19:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1802.587618] FAULT_INJECTION: forcing a failure. [ 1802.587618] name failslab, interval 1, probability 0, space 0, times 0 [ 1802.589170] CPU: 0 PID: 10252 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1802.590010] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1802.591017] Call Trace: [ 1802.591343] dump_stack+0x107/0x167 [ 1802.591787] should_fail.cold+0x5/0xa [ 1802.592270] ? create_object.isra.0+0x3a/0xa20 [ 1802.592826] should_failslab+0x5/0x20 [ 1802.593287] kmem_cache_alloc+0x5b/0x310 [ 1802.593780] ? mark_held_locks+0x9e/0xe0 [ 1802.594275] create_object.isra.0+0x3a/0xa20 [ 1802.594805] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1802.595425] kmem_cache_alloc_bulk+0x168/0x320 [ 1802.595999] io_submit_sqes+0x6fe6/0x8610 [ 1802.596520] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1802.597130] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1802.597716] ? find_held_lock+0x2c/0x110 [ 1802.598213] ? io_submit_sqes+0x8610/0x8610 [ 1802.598743] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1802.599330] ? wait_for_completion_io+0x270/0x270 [ 1802.604389] ? rcu_read_lock_any_held+0x75/0xa0 [ 1802.604954] ? vfs_write+0x354/0xb10 [ 1802.605407] ? fput_many+0x2f/0x1a0 [ 1802.605850] ? ksys_write+0x1a9/0x260 [ 1802.606313] ? __ia32_sys_read+0xb0/0xb0 [ 1802.606809] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1802.607446] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1802.611963] do_syscall_64+0x33/0x40 [ 1802.612421] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1802.613042] RIP: 0033:0x7fa2cf50cb19 [ 1802.613493] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1802.615724] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1802.616664] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1802.617529] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1802.618393] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 10:19:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2000000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:19:24 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 5) 10:19:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:19:24 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) r7 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv(r7, &(0x7f0000001400)=[{&(0x7f0000000d40)=""/244, 0x7ffff000}], 0x1, 0x0, 0x0) openat(r7, &(0x7f0000000140)='./file0\x00', 0x10000, 0xd0) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:19:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) [ 1802.619259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1802.620139] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:19:24 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x40, 0x80, 0x9, 0x81, 0x0, 0x3, 0x3004, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x417, 0x0, @perf_config_ext={0x5, 0x400}, 0x48008, 0x100000001, 0x32, 0x0, 0x2, 0x0, 0x2, 0x0, 0x9, 0x0, 0x5}, r0, 0xb, r1, 0x1) r2 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r6 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r6}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) socket$packet(0x11, 0x3, 0x300) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) syz_io_uring_submit(r7, r4, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r2, 0x8058ab, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000100)={r8, 0x3, 0x6}, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000c1dfd54b396e398e411000000080000d58d21ed3f12c6950068ee130300", @ANYBLOB="080039000100000005002a000100000005002e000000000005002f000000000008000600", @ANYRES32=0x0, @ANYBLOB="050029000100000008003a000100000008000300", @ANYRES32=r8, @ANYBLOB], 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x850) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x11, r8, 0x1, 0xf9}, 0x14) 10:19:24 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 6) 10:19:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:19:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:19:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x3000000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:19:24 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:19:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:19:24 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x67d5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f00000008c0)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000140), 0x5, 0x410000) recvmsg$unix(r5, &(0x7f0000000840)={&(0x7f0000000640)=@abs, 0x6e, &(0x7f0000000440)=[{&(0x7f00000006c0)=""/202, 0xca}], 0x1, &(0x7f0000000980)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000b600"], 0x58}, 0x2) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r6 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r6}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000240)=@IORING_OP_CLOSE={0x13, 0x5, 0x0, r4}, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) r8 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x5, 0x9, 0x0, 0x1, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r10 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r9, 0x10000000) r11 = io_uring_register$IORING_REGISTER_PERSONALITY(r8, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r10, &(0x7f0000000480)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000440)=0x80, &(0x7f0000000840)=@qipcrtr, 0x0, 0x0, 0x0, {0x0, r11}}, 0x81) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r11}}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) [ 1802.837324] FAULT_INJECTION: forcing a failure. [ 1802.837324] name failslab, interval 1, probability 0, space 0, times 0 [ 1802.838953] CPU: 0 PID: 10273 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1802.839799] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1802.840849] Call Trace: [ 1802.841177] dump_stack+0x107/0x167 [ 1802.841622] should_fail.cold+0x5/0xa [ 1802.842089] ? create_object.isra.0+0x3a/0xa20 [ 1802.842648] should_failslab+0x5/0x20 [ 1802.843111] kmem_cache_alloc+0x5b/0x310 [ 1802.843607] ? mark_held_locks+0x9e/0xe0 [ 1802.844113] create_object.isra.0+0x3a/0xa20 [ 1802.844645] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1802.845265] kmem_cache_alloc_bulk+0x168/0x320 [ 1802.845826] io_submit_sqes+0x6fe6/0x8610 [ 1802.846347] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1802.846951] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1802.847538] ? find_held_lock+0x2c/0x110 [ 1802.848050] ? io_submit_sqes+0x8610/0x8610 [ 1802.848581] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1802.849169] ? wait_for_completion_io+0x270/0x270 [ 1802.849758] ? rcu_read_lock_any_held+0x75/0xa0 [ 1802.850324] ? vfs_write+0x354/0xb10 [ 1802.850777] ? fput_many+0x2f/0x1a0 [ 1802.851220] ? ksys_write+0x1a9/0x260 10:19:24 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) socket$inet_tcp(0x2, 0x1, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x5, 0x9, 0x0, 0x1, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r5, 0x10000000) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r6, &(0x7f0000000480)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000440)=0x80, &(0x7f0000000840)=@qipcrtr, 0x0, 0x0, 0x0, {0x0, r7}}, 0x81) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x0, {0x0, r7}}, 0x0) r8 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r8}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x80, 0x9, 0x1, 0xbc, 0x6, 0x0, 0x1, 0x42, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xc35, 0x1, @perf_config_ext={0x80000000, 0x9}, 0x4, 0x4, 0x7fff, 0x6, 0x3, 0x1, 0x3, 0x0, 0x7, 0x0, 0x1}, r0, 0x6, 0xffffffffffffffff, 0x7c05304aa6effe58) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r9 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r9, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) [ 1802.851683] ? __ia32_sys_read+0xb0/0xb0 [ 1802.852208] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1802.852844] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1802.860314] do_syscall_64+0x33/0x40 [ 1802.860767] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1802.861391] RIP: 0033:0x7fa2cf50cb19 [ 1802.861843] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1802.864110] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1802.865035] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1802.865901] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1802.866767] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 10:19:24 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x42, 0x155) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100)=0xffffffffffffffff, 0x4) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) [ 1802.867633] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1802.868529] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:19:37 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:19:37 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f513, &(0x7f0000000140)) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x4737, &(0x7f00000001c0)={0x0, 0x67ee, 0x10, 0x3, 0x5e, 0x0, r4}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 10:19:37 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:19:37 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 7) 10:19:37 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x0, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:19:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4000000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:19:37 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:19:37 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180), &(0x7f0000000040)=0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r4 = syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r3}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r5, &(0x7f00000009c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0xee01, @ANYBLOB="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"], 0x354}, 0x1, 0x0, 0x0, 0x44}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) r7 = accept4$packet(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000a00), 0x80000) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYRES32=r7, @ANYBLOB='\x00'/12]) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x10, r8, 0x0) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) [ 1815.635597] FAULT_INJECTION: forcing a failure. [ 1815.635597] name failslab, interval 1, probability 0, space 0, times 0 [ 1815.641127] CPU: 1 PID: 10320 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1815.641968] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1815.642969] Call Trace: [ 1815.643295] dump_stack+0x107/0x167 [ 1815.643739] should_fail.cold+0x5/0xa [ 1815.644209] ? create_object.isra.0+0x3a/0xa20 [ 1815.644785] should_failslab+0x5/0x20 [ 1815.645249] kmem_cache_alloc+0x5b/0x310 [ 1815.645742] ? mark_held_locks+0x9e/0xe0 [ 1815.646243] create_object.isra.0+0x3a/0xa20 [ 1815.646777] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1815.647413] kmem_cache_alloc_bulk+0x168/0x320 [ 1815.647977] io_submit_sqes+0x6fe6/0x8610 [ 1815.648526] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1815.649133] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1815.649719] ? find_held_lock+0x2c/0x110 [ 1815.650217] ? io_submit_sqes+0x8610/0x8610 [ 1815.650754] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1815.651349] ? wait_for_completion_io+0x270/0x270 [ 1815.651938] ? rcu_read_lock_any_held+0x75/0xa0 [ 1815.652517] ? vfs_write+0x354/0xb10 [ 1815.652977] ? fput_many+0x2f/0x1a0 [ 1815.653419] ? ksys_write+0x1a9/0x260 [ 1815.653884] ? __ia32_sys_read+0xb0/0xb0 [ 1815.654388] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1815.655027] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1815.655653] do_syscall_64+0x33/0x40 [ 1815.656115] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1815.656753] RIP: 0033:0x7fa2cf50cb19 [ 1815.657204] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1815.659435] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1815.660371] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1815.661244] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1815.662110] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1815.662976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1815.663846] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:19:37 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000440), 0x111020, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {}, 0x2c, {[{@access_uid={'access', 0x3d, 0xee01}}, {@cache_none}, {@version_u}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r6, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:19:37 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 8) [ 1815.783947] FAULT_INJECTION: forcing a failure. [ 1815.783947] name failslab, interval 1, probability 0, space 0, times 0 [ 1815.785482] CPU: 0 PID: 10338 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1815.786319] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1815.787325] Call Trace: [ 1815.787653] dump_stack+0x107/0x167 [ 1815.788098] should_fail.cold+0x5/0xa [ 1815.788575] ? create_object.isra.0+0x3a/0xa20 [ 1815.789135] should_failslab+0x5/0x20 [ 1815.789599] kmem_cache_alloc+0x5b/0x310 [ 1815.790100] ? mark_held_locks+0x9e/0xe0 [ 1815.790600] create_object.isra.0+0x3a/0xa20 10:19:37 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x3, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000840)="af2fdf496d507aa54ce79bb8fe9e92b05a6caa74b7a522eb7fdc42210e61a75c39037bfecb8d1e446c1c6f39733b891c639f6ce0476f8536ccc26ade8c83b6556ded9228b13134be74d7681381729c0458c582a9072386ee7ab871f5fa7e445715765b857a1a9514a22ca9f2e6581a177c26a92b90fa5f9164338f7dc0a303f2edf031112e4ab1cfb9f5fbb05cd9eceff2f4912f715b864c60a6a692a30aa1616559d25346aeb48959b83712c0d5e4fd0d2d7e0d2ccff31c9dd4829d2bc6f7d892c1ced9d64d72a2249a73bb0afa7991847d2508909a185eb38ce597ac", 0xdd, 0x80, 0x1}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000780)='./file0\x00', 0x66e2, 0xd2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000007, 0x10010, 0xffffffffffffffff, 0x0) execveat(r3, &(0x7f0000000140)='./file1\x00', &(0x7f0000000400)=[&(0x7f00000001c0)='\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='&\'\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)='\x00', &(0x7f0000000380)='^+}{\x00', &(0x7f00000003c0)='\x00'], &(0x7f0000000700)=[&(0x7f0000000440)='{\x01\'\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='$-)]@{\x00', &(0x7f00000006c0)='\x00'], 0x400) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000000d40)=""/244, 0x7ffff000}], 0x1, 0x0, 0x0) clone3(&(0x7f0000001940)={0x206202000, &(0x7f0000001900), &(0x7f00000007c0), &(0x7f0000000800), {0x2c}, &(0x7f00000019c0)=""/4104, 0x1008, &(0x7f0000001840)=""/146, &(0x7f0000000780)}, 0x58) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r6, 0x127d, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4, 0x1de1a43b4360d136, r6, 0x8000000) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x4, 0x0, @fd, 0x1, 0x0, 0x0, 0x1}, 0x9) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) [ 1815.791138] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1815.796995] kmem_cache_alloc_bulk+0x168/0x320 [ 1815.797558] io_submit_sqes+0x6fe6/0x8610 [ 1815.798130] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1815.798788] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1815.799378] ? find_held_lock+0x2c/0x110 [ 1815.799932] ? io_submit_sqes+0x8610/0x8610 [ 1815.800485] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1815.801148] ? wait_for_completion_io+0x270/0x270 [ 1815.801790] ? rcu_read_lock_any_held+0x75/0xa0 [ 1815.802360] ? vfs_write+0x354/0xb10 [ 1815.802865] ? fput_many+0x2f/0x1a0 [ 1815.803309] ? ksys_write+0x1a9/0x260 [ 1815.803830] ? __ia32_sys_read+0xb0/0xb0 [ 1815.804327] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1815.805029] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1815.805658] do_syscall_64+0x33/0x40 [ 1815.806183] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1815.806856] RIP: 0033:0x7fa2cf50cb19 [ 1815.807309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1815.809646] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1815.810619] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1815.811556] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1815.812487] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1815.813397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1815.814315] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:19:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x5000000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:19:37 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x0, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) [ 1829.003444] FAULT_INJECTION: forcing a failure. [ 1829.003444] name failslab, interval 1, probability 0, space 0, times 0 [ 1829.006663] CPU: 1 PID: 10359 Comm: syz-executor.7 Not tainted 5.10.233 #1 10:19:50 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000004, 0x1010, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r6, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:19:50 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:19:50 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 9) 10:19:50 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x0, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:19:50 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:19:50 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f00000001c0), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) [ 1829.008469] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1829.017768] Call Trace: [ 1829.018094] dump_stack+0x107/0x167 [ 1829.018535] should_fail.cold+0x5/0xa [ 1829.018996] ? create_object.isra.0+0x3a/0xa20 [ 1829.019548] should_failslab+0x5/0x20 [ 1829.020009] kmem_cache_alloc+0x5b/0x310 [ 1829.020500] ? mark_held_locks+0x9e/0xe0 [ 1829.021022] create_object.isra.0+0x3a/0xa20 [ 1829.021556] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1829.022172] kmem_cache_alloc_bulk+0x168/0x320 [ 1829.022731] io_submit_sqes+0x6fe6/0x8610 [ 1829.023251] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1829.023853] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1829.024439] ? find_held_lock+0x2c/0x110 [ 1829.025126] ? io_submit_sqes+0x8610/0x8610 [ 1829.026174] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1829.027340] ? wait_for_completion_io+0x270/0x270 [ 1829.028503] ? rcu_read_lock_any_held+0x75/0xa0 [ 1829.029807] ? vfs_write+0x354/0xb10 [ 1829.030896] ? fput_many+0x2f/0x1a0 [ 1829.031934] ? ksys_write+0x1a9/0x260 [ 1829.033075] ? __ia32_sys_read+0xb0/0xb0 [ 1829.034240] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1829.035746] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1829.037258] do_syscall_64+0x33/0x40 [ 1829.038323] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1829.039790] RIP: 0033:0x7fa2cf50cb19 [ 1829.040876] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1829.046265] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1829.048442] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1829.077343] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1829.078214] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1829.079082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1829.079952] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000006480)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x100, @private0={0xfc, 0x0, '\x00', 0x1}, 0x4}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000300)="8fb88bfb984067cc290d442e96e6cc9a70ba498dc46467230390a80e40db90f9f5a5d4fc4dcce7203cea137090f628459dce93023acf12cf43ae2526b8263c95609e59ef37f617d7d2d4fe182e487e790de750853ada05d455382f9b15204cc6e577d54aebc1ee6119b737d5b312af4988806b24043b30cbb94f00a5a3166ea2d35290dd68e36c089038c0db6997bd229da39d20436f6aecf443e27bce1b2e77b391ca3c0524296fe201f652d4b705c8c15a947cfd52667d98ab52e865219aef21c78192851a18b4aa2297436a5f1b3d307e85214a70508684f743a664b9f8fffbb46cee", 0xe4}, {&(0x7f0000000500)="44e286659bfff2da91d5271f903ebde53e75a1283af1482e6068fedb30324b5c3507bfc54594a2c18e4f7dfe5d1a0d89a4ecc0d3388da8720a1fa5043a8ceb2af3784cc68c3f026df44e08427ddc23617048b2c73365308fad661fd15738844ba493a60f1954c7528b24e5b296530c3afc326243ed8ec83bfbe002b6aa2503d4e9e37d04cf2f53eb1cc6d5d8fa0e023388bfde2864563bc776aacf6c", 0x9c}, {&(0x7f00000005c0)="3accd0e711e7f02c82cc09063a805f408e241e1f9ec018921eda36215d26028b75d02ba88104f4bd4785b385f59069b0f7467b836ced235e8d2ea38e6a86f4b969b19ccf73a1feaa87a68c5947451db231cc9c2b8a46e2a8377f6b77a2c140f3ed84ae8f5781a9d33d365045492422a20aac327da5cbb5fca41bef723ba4e069474d8349abe179886a0befba19c462356e168ea7cd6fda5460d3ed676d0271e42364f422", 0xa4}], 0x3, &(0x7f00000066c0)=ANY=[@ANYBLOB="140000000000000029000000080000001f00000000000000780000000000000029000000390000003c0c010300000000fc000000000000000000000000000001fe88000000000000000000000000010100000000000000000000000000000000fe8000000000000000000000000000bb022ffc01000000000000000000000000000000000000000000000000ffffac14143e1400000000000000290000000b0000000000000000000000403052a522d38b7ff73a47240094898cec3c927401a150b942693ca47ae1d6dcc4dccd15d95a7e19f5834729"], 0xa8}}, {{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @mcast1, 0x8}, 0x1c, &(0x7f0000000440)=[{&(0x7f0000000240)="7f8064443dd1a6fbc9737d7af50eca0d2dc2e36b63f57176761860f81d37cd08960c2cc286a798000760ca085a44972441842dfd88cfe052581210feb25920ffd3a715af0eb36fc2258423019c7417b86d4d5bf91d36af298aba", 0x5a}, {&(0x7f0000000740)="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", 0x1000}, {&(0x7f0000000400)="6b28ab6f1716c21a24f8bf5b766a9191a421961372a7298714a903e2009c1dbf89b0511505b7e6da7c26b4471def1e3cf1daf2f989efdfdafeed870723f2ff59", 0x40}], 0x3}}, {{&(0x7f0000001740)={0xa, 0x4e20, 0x16, @dev={0xfe, 0x80, '\x00', 0x20}, 0x5}, 0x1c, &(0x7f0000001940)=[{&(0x7f0000001780)="25d61ace49a64beffa718dd30e783de870d801d63583f3a5a315b88f09dd34f5d788c8c2914485299e20fe8632c4e49f0a31adf33ddd06df0bcde71ab27a60ea59dcc5f10d54582d5ce9ba4f25410978f4d996731ca0063fc3e2a5", 0x5b}, {&(0x7f0000001800)="5b63ff2133cd6a2300c1bcfed7e3cd14ec2e99f246f61b846f", 0x19}, {&(0x7f0000001840)="ac4b3d91c3e2058e053e9af31121ebf55781d7f19c29afa8b2176de4c19848429e5f028925a9506d495c26dbd3bbc14f02010a28dd98e93d2676811e8fedf57d944fc6dcded846e6317773e123129f447937b25479c9fea9955253a18b9bb5e361c296ac8c89bc2be0aa308a9b63", 0x6e}, {&(0x7f00000018c0)="47565e307212b7bc36aa97c5594b5a91a16b1dec2c39beedc92849b8b9c502779bacdd0dcc23e6101332ea56b50503eb534527cf6306cfd1d51f85bec9ef343eb8bf902b329ed1d0807dcfc0f1b05cf9050c1e2e24845197df98", 0x5a}], 0x4, &(0x7f0000001980)=[@flowinfo={{0x14, 0x29, 0xb, 0x81}}], 0x18}}, {{&(0x7f00000019c0)={0xa, 0x4e22, 0x4, @ipv4={'\x00', '\xff\xff', @local}, 0x81}, 0x1c, &(0x7f0000001fc0)=[{&(0x7f0000001a00)="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", 0xfd}, {&(0x7f0000001b00)="751965002e4b82c6ba74c00f6d8f66bd8c91b31d6aaa0a6b20c279769d79be085c79543269d2c8c4ed9bc983476b350d53e5c465e44d3f095b4db33a769abcd05fbc92f3096e4b053a867cf9ed2c81efcb28bff4e5c4cd4f50ac2cdd18a063e2e3471eabf9de4f6039b09f4ccca4efb23dd721078de97deaef71f1425b4a7fe29efd80a2698149064fbfe16c0428fea67f588775a558", 0x96}, {&(0x7f0000001bc0)="4491e75181478660d86a655a6f1909a04e9de0bd850249118bff11e785687122d9f8734f92ff15fd50e8d5ff8d08777bf197784ac6ee5ee589b61cc0beec3e3aee3a4a801a752a5a7e9c41d90f445079a8", 0x51}, {&(0x7f0000001c40)="e101dd7889d037c5c24b17c945ad95dc0468522524de7bc27f339619d7e6b22a6b4bf0e9ba403564351a539cd9fa7fd85dc4a5754c22de4f097bdbeb9e9239684dd6b80e68978357ed2460a48627a900cb6774d41de5eb14d023f2bf84c401cf7f3cc7bd23036d9dcf528b42564e684af32909c5b49d9276", 0x78}, {&(0x7f0000001cc0)="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", 0xfe}, {&(0x7f0000001dc0)="0365bcf8b0b0b69a78d1083c80f342c1fdb8bd803a2cd124c8657ab90ad5c64a1538606beaff3007c1a8b562a9daaf0afc0b30cad241bbd3c67c99685fde83395d3c5c758b3e37510b0cbf10f0112c25220cb414af3f6608aec99e8e12d6eb5ec3c963ae5076b473fa5bc2cd7eb624b160956fa27cbc4e2324a5f83bbe59141a559262a132f8669de3ab2a171d50054f8534d57b898bda1dd6479a9337c5d9606cab35d56f76b453ffbd80942377908b268dd232508ec957d0555afae21b24c2257fd0bdac8573c7b096b201e301ffc83f9677883bd3cb697fc88b2eb033c522c4f3350ae2919c7d3b91c8e25b97b7877116866b772e7a0353bed5c16c31f0", 0xff}, {&(0x7f0000001ec0)="249694c6006c21588867d37332e7fa833e1abc552602bc572011b85cdee15336210b56f33a3abc4bbc68dd6a794c72be392bd35fd34eecadbd85859b9934cefedab0079afeded6341968bbeb21da88c6864f9f9503ebef9e824732ef956e452a87d78a5bb39819950bae67c022a077c37e558b7173f7430fc694213bfff56b8fabe0fe93f0d7b31ebad185723b56899f9cb00c5b457e7830ceecf3964733ebfa8032fe491bf8c1850a0f45e5e956f7770cf84c0b4f0988e3be4cc963e6e39f7e8aace27633cce78acbaebf3d8f4a", 0xce}], 0x7, &(0x7f0000002040)=[@rthdr_2292={{0x48, 0x29, 0x39, {0x7, 0x6, 0x2, 0x1, 0x0, [@loopback, @private2={0xfc, 0x2, '\x00', 0x1}, @mcast2]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7}}, @flowinfo={{0x14, 0x29, 0xb, 0x1}}, @dontfrag={{0x14, 0x29, 0x3e, 0xfffffff8}}, @dstopts_2292={{0x90, 0x29, 0x4, {0x0, 0xf, '\x00', [@generic={0x8c, 0x4b, "24d3c07a5e644e4b2dac787ddd6948e78aa838adb5dbc3045d3261eb9e7c17d52f4a5f953cdc5c3d561f2ffaf5d9cd1480b2d416612ee5575c4c89b52efa47afc7b97b210208ec3afec9ea"}, @calipso={0x7, 0x20, {0x3, 0x6, 0xfe, 0x4, [0x903, 0x400, 0x4]}}, @enc_lim={0x4, 0x1, 0x1}, @jumbo={0xc2, 0x4, 0x5}]}}}], 0x120}}, {{&(0x7f0000002180)={0xa, 0x4e22, 0x1, @mcast1, 0x5}, 0x1c, &(0x7f0000002540)=[{&(0x7f00000021c0)="ef44ad518b3740befd20bb693f9f0f30726452c9c25f141de63044ad205a255c6f007e49654bb03d", 0x28}, {&(0x7f0000002200)="46790e200769309a5772e0c68a08d458e5dc823e", 0x14}, {&(0x7f0000002240)="8fc55477879967ba3d7b", 0xa}, {&(0x7f0000002280)="6107dc9c16f544351d0c41226f3cd0e9cfda62fc910697df6f45e099ec5fdc43b68e00d5e551b9bb7b958e00e477f58738d1979a71101065324c2d75b71355f184bb5511b87641097438225525dfd486fa66cbc89b2604bfb8d40ea6a0107c444543fab627d436ef51894ceb5e835390dc75c7259c798a70c0ae30b0e5a87f5f7b8d2659ebd4dd089360195604ca480e00b63e963bc7bafb2c81fd7a7df6120202c8270a65e15d7ef70b080615fada4d61181f973d", 0xb5}, {&(0x7f0000002340)="4205d1e3345f1934b4bef22f9cef0d7f72ad938e0194c776998b26fc6b5fce0e7bdd08d1bb709fafb1cee2f8c2592be0d27903e380d625ee1e9b5a084d762cb24bfc432ae18479334b40618907f522637a2faeee28760355b3aa22d55e9cff547b02f59719e748c935da296c8574c5e4a8d22bc3386aea89262cc1cdbc701c677bb925d820822a192c2ab440e6e18c271a20427ac1f1ebd0f403fb03bb5a5c8871363bb2f03a403733a3f813dfe573d20ec69ae0b1", 0xb5}, {&(0x7f0000002400)="7cc258f614e86daf5a8f48441028109fb5af36418300c8d69e6d26ae8d4ef166ea23c6d40ec698e166c6c105f580e11d3d4b15d3d31823f7524cb0f87056c42783b59d3e6b93c7b4da4495bd340f428a141a93419a46d8a7b40ceff6247a1e51350bed6feb94ca11bae85e26b5043e8a7af60ba1fafeaee492a8e8", 0x7b}, {&(0x7f0000002480)="a008046e471698bbcb9b4ea3bfffe41d30a410d802115b9afd466154a8dcbdc699a2238feeb2143e36e0609aeb182dc88533c818fcec97bdb01d3aab47a2b7740ca538365973d1d12502e797e7713d478bf2f257c7193f9d36a6704f110ab5a3c0103536b97a945d68268ed55dbefde3a74cd7d1a012f800907994b259abeec0230f1196a0891a76c4e218ef5f86408df52e09", 0x93}], 0x7}}, {{0x0, 0x0, &(0x7f00000028c0)=[{&(0x7f00000025c0)="45e98f2dbb05b048704d49a8529466fa22cbe2ddc1e240752140357f4a4fd00c1a881be7e5c906db840814b0fad8d7dbcb61f35009ec9a096a7e6bc413a183193e272ff34187a01fffdc3f30ba25b79855e5bcd59ea3d999df5c64d944c99d5d71d43e62f0fe123f40b88d4668b4fadb6590226637bd96a2d12c78acf8f539c2a757a9d5fabf6a91bc2f7040fcc950404b3238dd3cd6fb4e6016be8ba122bda98ef329ecacf53f1fbfee14684b66cc2cfb437d03135724be741b2e1bccfdb1f77cea7b68476335aa8d4c5f148f6c4f82a2b379f28f2ed70c5096bfc070b6c0e3553dc3863400395bf7", 0xe9}, {&(0x7f00000026c0)="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", 0xfe}, {&(0x7f00000027c0)="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", 0xff}], 0x3}}, {{&(0x7f0000002900)={0xa, 0x4e24, 0x8000, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c, &(0x7f0000003b40)=[{&(0x7f0000002940)="c63f590b5d51ddbd5f7cd2a91b5e2b8005fc531527aa56d23774f64268ac59e8a704a52a7c47ead3ec0ed84fd65a871aff5843c0", 0x34}, {&(0x7f0000002980)="ac18de3546769cf63f109262569d1f4ed3470416c3c805068899deac49140a3cdebab01f84700d0189e7630d64aa0dbc3049684f14189883668a2702e1997e4848e3fe229ab22c1bc74b3be4fe252d1c75919bf4e41c0addefbe6813e66ed2110b44e1fed8a2816fa6764da88dda2a7f79aeb2ae2a9472417e52355608f5b1adbd30c6a61fc0", 0x86}, {&(0x7f0000002a40)="0433dcf853b414ff0370856eaefcc6798a06b7c945aea1be89a9e96623627e6c23f6216970b4", 0x26}, {&(0x7f0000002a80)="592ff4061a390d6b802735e5d07e9605e9552a35e1132f871dec6547efbe7f96c32befe861f5555c5df3b9348a0d0f8435146caab79b15df8b745a5ba93bb48ee702a8f33ff7ea1f602d7624188633a7ebb57070549bdd0c4e1277c143e56cead43e4ad52d5f2341f7323f182d63fda83f27f805cda3bb78795bc953882d2168ac96292bdfc177003ad304b8be395b53d75a545f6f11a7aa129dfc6ca0977785d4694207a7c91bf2187f1910f64e22acfbf644a7f10cca71f061c258023713c79333686f69b923cebc1b43257d435eea064a2c48b5599ad380995b33faa4d238f3378ee54c2cf1e5011d8a98ac531a863ca6ede65c162c0b095dbd18dc72d53b0f6dc24f5e99afc38a7a7db3cb9f96122c979dbaf0234ad46ab11b3d718ea56079a61ecf81b2633a64211625ba93d0775924009fd8583f10418949eb882f763941456fad01fcadfaff7b7d1ed19c0c0f12e7d0a7d74d20b62c15a4a73573501d9ea9059686fcc8def3dcec6bb0cb429e8f5ecb5ba76126629b038f91f6ebc3797ae84357314da8b8cc8e8273a95b64965eeffed684c7697ba6654f4ba391266a2c2630afe78a11ffedd26deef34cb056ba1bdfdefde6d9ae546e1d385eca9526c2bfbf4aad79a6a81e3976cd94e0f2c3e617a37671f2a086dc21c650e2ae8cc6391a63c5cc1ce4c2d66133d97c4288d15a8deabb0014782cc9ff42b8b522e5b67b21c2f8c34cd5951eefcb902ae8b6b63ae70f44be050ffc6b1755a732454e48c1562c0ffc6f767f2a73a6cdea2fbe6c0699660ca7a7b696165d74ca39b99741fcc7d3fd6551e345c70acff78d47b81f23a769d12b6e20a41b68eb3133b899653f07eeebe0e4b8a0de62fa7526cb783a72c8dee6a9b583e6cb5923dc2a2f6105ca7e462c51fdbd835555381a9f066ff88de692fbf2472d332c26ea2caf5ee94b9807e23dce6ee6caa91d8a68d1d63812209c96854ac4975f126594b1d45f37859505f00c3e2028d1e094874a9c5c72d44ebac48ced69f11f04e78dfefab6499e5910428238e8f2db5ae0d9848a3e0163208d7ad2d774c6f65fd3cdd471f3c85d3a9d9491841c0690ace2103806d7cee0adbfc8b4048ebec6f6e148cdc73daf49eaa25678fde2d4cc18ae3dd2eb912f5492ee9fe1699742f61986a7a172bc67b1a3957fb338988cb8b4a1f5211e543fd4e8eaad3013925deca38423ac696283c78ce6f6c86ada31aa1e981cb7d1c9cbc5fddcc1de0f2ab92351fa9f6c03cb2bf2e1919760990cefe807e17ede6ffba7ba2acb1e1f85900efe0d9e41c0491540b03efd9394f7a0412cafa945bcc9bc6efb3369aeba8bee2513df4ec4bfdb22f3d6bb25321c8213a38a3bfed0457c16fec7e36060986e6583c4d570267e355fd5edbd9212f6da9621beae865b36595f4ca78e58e6c74aa1639840a92b7d15b1a82d89513c615de873b3c9cdc1c020224982781a7c92785eca5bffca1b6f039cfe91a06c0a762dab37dc006cafdcaeb90196618d18c76a9e68b0eddeff1f807757696ff5b46cfd4d5919574d6023e3fa8ec23f8d5080c7b1c556b8f759ab43030abaf5abe3717de9277cdc6f144d942019bdaf9c2ab5ce7ad79dc274404ffd1f128d1c2aecbe4e85aae496f8c7899bc237318c489d3e074fa306457cabb897063ca482fdc8847168d6d609dc96ce0801346358a8cebf0218445d959bdb78746222ae0221548f9f448e0475dac3eb8a535d669f9a0cdcd206f96ee35fdafa75dd1cc9452a8db2962be9d9190d8ac584a55863d34f8d053d07c94de498b30a9542aae5af7095b436306b0db6ca11fd534ec4c8c920d78725f54885195e7e952058a7df876926bab3a130abef8615b8cb75704c4b65f8f8df1fca3bc48d6ba993f7585ba7a41050af5d79c290c7628a5d81db77f7e9c88ce0c444b8ec2521d216ab57c860d41fd59ccd427239c930608312e4b77abd5fe8003baf1e5d243cdc8b4469036005142797a246f04cff462be02d74a57bbb0b5555907cc46a3d993a460373dbc60bfbd6d7940857a73b9ec90cd7da258f302edc16ce55795b2d8900308bc9c04a4f70389a34c263f6b153ac4240281f8bc40063ba5867e0fe1447c7b6b6463ef736faa5e9c2ee014f623d49f51d984695644a1342a42af6785aced3dac456976067e485a57f3479f72a547cc6043dde4e5e2b20a35c434b5b7a8aed2046257feefc3d599ac97f8384e9a3fbac1f1f8a3fe80194203665051c15044b17a0622dde5e5bd38e00dd78c21fc4c408e09fe6b38d6c5bf213f6ba6cbc44773b06ae64c9344b267454780e86aee642f4602ed0e2dc6698346728413d553833fc81a3842385338d933718af8a0c01eb968cdacb9179cd7fc5005334ce4c1ec7a33796e49b302709a3aeaad411ca607d35d4c6b369178bc2879debc14f01e6e1cd1792d0d172a1abc63d4a32e86f7a1d204949785c74043eb272d284d7360051cc54cd444a77834ee9643cfdd8c69ee389eee8d286957501f58cc8347efb1ad55032c11a445de8bb7b197b34d30e29d6d50e28af3f2e27e79deadcca15d2a3c9dee8b24000a3edcb643160b8261e6614407dacc41afad80f60943763e35ee418d8c8e865b5cd9a98c009107f13a7da89f17004367d6c6399da584ec21175295906b3c64f574842a28b5e20ac857eba97c6ffce7885a0bb711bbdda916c0444079a9b3fb53909961a39641318c8530d03a86dcdefe91c7e13ac5d72dd3df6b695e3efe8816fa1c97ddc3fc3e3fb31d67b487eae8ece63bc08cde86797fa339c77298c9d268789ec2890c910248a7f6269f3b1cf0d8d305ba2e7755ba856254c06618a4da97e719c9be1f9621f831e62e07e40f949ff55ccd8df6628a73b7200e5e6fccaaede816b4d96fde4706f1cc527ad2b58514a723afe8ad193d6615c0e59629fcf72feaf67c11b604dd37c687ee50906083d050007a823cb125ecd6ee51ccb87bba4fb149fc2d24f9587c521a8da35700f7dc9ffe0dd3dea0088dae17ab44d4807649e61f108190fd245ec65f1ef5d449215ae8369e5ffcfa97b270f6bdadeeb7fbd75c2fa563a9b415e7a0f00f026ba267f9d3b9eb7509f6a2f2dcd9e24a40a9bac4d45f00c1489d635fc01babf7582d69b0fdbfcbb90d3fa2fa040a91181f7e378c2198a315c45f6ee46e07591d8575d8002ee21218fb90b4e79c2b25feb9735f393c1bdeed90025e6b55811e3933c55de224cf1629c342d316ba2e5061715249479275f70878a3a3a729cef35baadaf34c66944f3ea82be337256fe923e40fb29c3ec1e003bd5037c46dc7a2fa3ab172ce702ee1a33eee525097cb94b3ad74b52b5884ff10c60c9eb246c516e0bb35941397016944e9a831482e0f7f90cf78b54dbb1bb5cf6b81fd49703b750c375f74693c5488ef3f6d9e717902fd0d8108592b89c4ecd175f88d09a8d24ac578bb099b74dd25aeb71fe24bd5f28d9b90f1fdc4c37d35ec0601e7dd608569094a8411818b0dfca65624be7aa265ac0723bd22ee4517e881ab17f80ae5ad86f11507068187e8aa6ee37d762f38ae8102c180c968999085b85a2d1d3a186c55acdb8861f0f11d46a4c4cdd62dc6cedf4d37bbec57fecc9cea15f182962421e2e84c6a3f3f836302c58ef21346d0f1418c257d337bdb392d4bcfba648b2d4bff2440d4d89591f8e0576977d5aa192e2dcb9f055969e839ecf13960d69446c5d388b33204ba782602e573508055d2552376bd66237c3a4bdac92330bf2304808a4246448d5c616b0452d898e8031a65d1aef93e8f5f5fa8664ef41c9554f967538d7e04e8a92c044729929be553e80a9f033122fabad560fa4a980f8c44665395e4ac88de8db2c141049c0e9f95e51bda4d89c0ddf7a0ab9f8da37a7384d9c16b805045080b24d367e57c42da6901a34b75b910ee52a12d5c4412f955272f37b0fca5397aad1275059faefd2fea040ab69656865d465001de9f32281d963962b6377aa17cda17ca85aa19c8eb8690b54a025673e660c82678d724edd6715e3a0ec6f1fd8d625dfd4218dc849200b6434aa897a00e04a170d67059b7e33b3b37675180fce78e28fe53a0340c7790b2972754db0c89a7207f2e8b992707aa14c5b0ce41b0a28a10897a82e51667d482fdb46e41f8d0cc1e517ec1a3105d45cabd501c607bfcff8e315ba52d466d2d209e1b00f22320313e2b151d36314e3c28fefb5a38d54681cc4eb5e3f2c957ba53d5e4555d51c699a96880bc8689480fc16a2801acfe2a1a4c398aceeb31ebfc87d6ceec88a97091c001b4ededf94c833b5c78c420b2ac533fd6dc036405453b19bcc351ee92fe4e1a58611ba196da807f7d04012a6807e8444ca834b3f0a2c00be579e9f4ad8fb1f2005c20c201c3d13427a65f196cf57e4972956c449b1d0f2fdf3cd057cb661702d3a5ac45f9beaa7d1bf0163109910f11f8159b4e3fd5a9fa1a74af1d6d44e64ab5d87991b6a29bb2957f73cf0a3c1d0a3334ad7dac7de89b5651d64b852c7dc33dd54a3d59a195208211f5432a9e72b50eb8d83988ca7673e878ff21b9e5d5396b22851603dab3f30416de4306dda8574100986db68710915c75b8b06c5180dd9707d924a1fc6c3ade283aa9daae37f4bdcb69456e9c5265a31921302c5d89c2b2787edb7096e563eb544ce161529c96073b4779c35d349dda5fa9f71b7d81c43a117412f059bb9eaf916fdacd20b11f6b5cfd1a312ccfac49ba9dc2086fb883d3ca5baf37858c816765da3f0ca8a48569e5c8639c6ad5748f9d5f6ff7bfa6ab95c6a865a9b24c46e0cbe209c268889c186354a965d3c2a533b2569c9e4fe100f08757b35bd61f1ca041ff408a475cb0d06fe2428d3d33410ca7d5e7b56b0443830a699b542ddc129a2d53d3c8e77a6b0556b1cecf6a57e87b3aa995513f4ff38b8f02801cb3f5bddb49f9ec09380ed39d1b66918d948d4b1a58e1eaccae0e1785cc99bf75509be6422ac76952f6720a5829fcef9c868f59ef4c7a338aa6cc99637f6e89a2b4571fb5bf799d3d2bdbbb1e67a5c548adb7838eec566011a280b7bb246178c80f86338934988f3dad39c07a1e043d6abaad818304eeb1a156da29a017e3866230fe29c45b578bfc12abe21e92a58d9b340d535043fe83af9e78b64a47c3c1b02fa621ed43be121c4aef7d77992aadbad4dbf90a32ba85081082d0fd2414eb73f6533fb934dccea476842db9254b58661bd1f4968a369cd03c396d0cf121e4165e716af75bb132ed23b476d8ff4f04b8635dab5f7a751f49efea5e10b19cab8d69d763e8817bb3266041381926cd4265c6ae10327a576720ff82c4ac16bd1d34195722ca9e27fc26d9b8315c334a463d5dfbf23828764c95d0b9afefa257568121a7016be49f94c20d5bcb423bb8f74429284f88b4d12383125536ed937db99ffca0cb9a6d3f6d4dba09c1c8439217ffd890d2a941e4f4d0ce7ad0d85332b639c6e58bb9bdaec96fe95b87e5096d5212c4a69132e58b73d975d56e6a9d7e26248097f8b79d356fe63c348fe181b1971ee4bd8071973ad98fae0f199eebac2af766637b8a7a1d87b5b92fee3dfa3e461833929cea4706d52e5d0a67f804d472dde2ad396a60c9434574c19342d564ce5eebd2f0f856cba8f293df4a3d7164f8c6f4aa3e7731744787d27bf2c1655b028f401f0b163f2e09f3177141cf60da291884d35e5221cad1ae8db053349e593a5a776a53daa075dd672b1d4b4bb5de9e740970862f8c0c3f34004bcf06917116b0e91a124c1579f0c401f", 0x1000}, {&(0x7f0000003a80)}, {&(0x7f0000003ac0)="b49d6f3998290ea6b81e5f2524424fb4e2d37cb148c47fc1b5bd18f9e61f307789bbee2fd60ab47eb42d8c2fad542cf3cb910d4d823e139603c72cf075383100679d46c40ac82c89fa530e3c60052b6d3ec0426e51e0d471266f", 0x5a}], 0x6, &(0x7f0000003bc0)=[@dontfrag={{0x14, 0x29, 0x3e, 0x3}}, @tclass={{0x14}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x8, 0x6, 0x0, 0x4, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @broadcast}, @private0]}}}, @hopopts={{0x78, 0x29, 0x36, {0x3a, 0xc, '\x00', [@hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @ra={0x5, 0x2, 0xfb}, @hao={0xc9, 0x10, @private1={0xfc, 0x1, '\x00', 0x1}}, @hao={0xc9, 0x10, @loopback}, @jumbo={0xc2, 0x4, 0xffffffff}, @enc_lim={0x4, 0x1, 0x1}, @enc_lim={0x4, 0x1, 0x3f}, @calipso={0x7, 0x18, {0x3, 0x4, 0x81, 0x6a0, [0x1ff, 0x8]}}]}}}, @rthdr={{0xb8, 0x29, 0x39, {0x11, 0x14, 0x2, 0x7, 0x0, [@mcast1, @mcast2, @private0={0xfc, 0x0, '\x00', 0x1}, @empty, @dev={0xfe, 0x80, '\x00', 0x3e}, @rand_addr=' \x01\x00', @private0, @private0={0xfc, 0x0, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @empty}]}}}, @rthdrdstopts={{0x40, 0x29, 0x37, {0x62, 0x4, '\x00', [@pad1, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x18, {0x1, 0x4, 0x7, 0x8001, [0x42, 0x8]}}]}}}, @rthdrdstopts={{0x1173, 0x29, 0x37, {0x1d, 0x228, '\x00', [@generic={0x21, 0x9e, "2a374a7ae84147b5b011c38cc23367afa523777c188aa0ef746e19a46ec7a5962ddcb20a1a42f329ba83a17c7d9737393652da7a04c73a5ac78cd38a9a678c3b6f04ed3fd9ac2c8caa5164e2c9d9c9db6099b858f577f8ff886030bb0328f932686211e781e8ec97c3587f8e153651c69128b6f5a0f56c82c2f8aef3d3f5b8d9722e223e3daa1dc040fdf7b3d92b914e15b7bbcdaa88b34d5f6d065ef679"}, @generic={0x80, 0x1000, "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"}, @jumbo={0xc2, 0x4, 0x6ba8}, @jumbo={0xc2, 0x4, 0x3}, @ra={0x5, 0x2, 0x3f}, @padn={0x1, 0x2, [0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x80}, @ra={0x5, 0x2, 0x1}, @pad1, @generic={0x71, 0x81, "344fc2f933693faa966e0e431e12c9076b8b88356277191585bcc4e258fd6183c0ef01e7b501d5cb0d44fff4416a54e21c129bad7e40abaef9e4f7bb714357b4a66e9240176c40a47ef1ef20080d6cfc20ae7b10832b124f2e2f39f953aa52b76eb103b7b653e5b0c0b578c5f12c206a5f492aeb99b21219ca88b38aa5cf741a17"}]}}}], 0x1348}}, {{&(0x7f0000004f40)={0xa, 0x4e21, 0x5, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7b02}, 0x1c, &(0x7f0000006280)=[{&(0x7f0000004f80)="90232d1c6dcf537a3a6bdfe1c97c8570dde164f3aca14858cb903bdec69965c55511e03f4d6a20052da8a223f8e591bd9681e24fe3f6d4a31d34de01a4165b4ef92ce867ddb1bd392f6e9b2ab4362b1219f6cfd5ee505449db450db0ba8a5cc2651ed6808ce6b9436b268d6aef52b0b286b866d0dc113c6a02c26c6f21bac81eddaa6fa45fdd5096cb33b7b5cb7f65ab81", 0x91}, {&(0x7f0000005040)="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", 0x1000}, {&(0x7f0000006040)="e4d48b5e1a2d7337f14b4aee3b79043db5f3e96e4a04e05594e646e96414d6988e92f348d21af2876d9aa271cd012980ae7bdefa219542c5922d900a56a40233b543c23d3eb75aeeb9edc4a56d2e742871d8671747318afc5c0b1fca49edf1b09402c1b11fba6c40df5299cc30b98736327e5af5d493eca9bc8c0c30c0c5d4fced28fe362de876078c11", 0x8a}, {&(0x7f0000006100)="c0c11b3788a3a13ee036a42df962b7f523d6e83536af438501f34c03247b5ad8099b6f792d3642659603bab1cff39d596db0246985516deb0b1316c4448fdfa9efd72918c71c65eabe15a9f202106eaeabc08747ab01451050c6557b9fc9", 0x5e}, {&(0x7f0000006180)="dc81a82f41493a5a31f6edb69670df12bee31063f7d945bb492ac9900777bd3a946c3482fd7e1d19a4af9ec22ab8d827be3556300bb55d00b675bdd8d1f7e8768dbed10a627095fcb2025689f3b8336f69a421f683845732262ae275e451b4ac1dea2e69aecb3dc2968e466e884577dd9ec906b5ca7b7360e32287e2aab4464a68dc557cb3ebfe0e4ae2a000ef551e39592340810c297bbe2299d96da6612c06673a0cf323ae177066eab7516aaf89af6763598d10f073fe5c2a74df09f3c751", 0xc0}, {&(0x7f0000006240)="d9c885c312c5d03abe4f3eb210f1813a93b8584fe9b8749420f87c943fb651e3a0", 0x21}], 0x6, &(0x7f0000006300)=[@tclass={{0x14, 0x29, 0x43, 0x4}}, @hoplimit={{0x14, 0x29, 0x34, 0x7}}], 0x30}}, {{0x0, 0x0, &(0x7f0000006440)=[{&(0x7f0000006340)="53ddbdf127f4caaddeb4ecceb71fa3eff8894969b9d74b5175e14489c42bdffa624fa6bbf580302cac491cd99f346bda98", 0x31}, {&(0x7f0000006380)="5c9ed069f3953dbdece0a79758a4383d273d5b14f2ad8ae50db6dae00bd030b51b8a45f16b07b3b4de1a02f528c6307aea193bd3663396b6e34f01fb2f32948298e35658463701beb9c7c9f9b1f987da905dc3bf7b1b54bcf023157f53b57709cecc0ec81ce2f66e49c48505f096b77d4372bd5748b9079e1e7b2dbebd83b4c66978fd052f3a1d7ecf306166715e1fd87cf6d8defed8d8", 0x97}], 0x2}}], 0x9, 0x8000) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r5, 0x10000000) syz_io_uring_submit(0x0, r6, 0x0, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r7, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x3, 0x0, @fd_index, 0x1, 0x0, 0x9}, 0x3) syz_io_uring_submit(r4, 0x0, &(0x7f0000000700), 0x80000001) r8 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000680), 0x109002, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r5, 0xc0189376, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r8, {0x1}}, './file0\x00'}) io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) 10:19:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6000000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:19:50 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:19:50 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 10) 10:19:50 executing program 5: clone3(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = accept4$packet(r0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000200)=0x14, 0x800) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000140)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, &(0x7f0000000240)="1c06b00684ce59fec9b6", 0xa, 0x40, 0x0, {0x0, r6}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r7, 0x10000000) syz_io_uring_submit(0x0, r8, 0x0, 0x0) r9 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r9, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x3, 0x0, @fd_index=0x3, 0x5, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:19:50 executing program 4: clone3(&(0x7f00000005c0)={0x300303e00, &(0x7f0000000340), &(0x7f0000000300), &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f00000001c0)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x5, 0x0, 0x0, 0x4307, 0x5001b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x4, @perf_bp={&(0x7f0000000380)}, 0x0, 0x3, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0xa) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000001800)=@IORING_OP_CONNECT={0x10, 0x1, 0x0, r1, 0x80, &(0x7f0000001780)=@l2tp={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x44}, 0x2}}, 0x2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x8, 0x110, 0xffffffffffffffff, 0x8000000) syz_io_uring_setup(0x0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x20, 0xae, 0x0, r1}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000008, 0x40010, r1, 0x8000000) r7 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000001640), 0x200003, 0x0) syz_io_uring_submit(r6, 0x0, &(0x7f0000000140)=@IORING_OP_READ=@pass_buffer={0x16, 0x3, 0x2000, @fd=r7, 0x3, &(0x7f0000000640)=""/4096, 0x1000, 0x10, 0x1}, 0xff) syz_io_uring_submit(0x0, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000440)=@IORING_OP_WRITE_FIXED={0x5, 0x1, 0x0, @fd_index=0x8, 0x0, 0xff, 0x2, 0x2, 0x0, {0x0, r8}}, 0x5) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) [ 1829.232030] FAULT_INJECTION: forcing a failure. [ 1829.232030] name failslab, interval 1, probability 0, space 0, times 0 [ 1829.233581] CPU: 1 PID: 10385 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1829.234470] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1829.235512] Call Trace: [ 1829.235865] dump_stack+0x107/0x167 [ 1829.236340] should_fail.cold+0x5/0xa [ 1829.240464] should_failslab+0x5/0x20 [ 1829.240975] kmem_cache_alloc_bulk+0x4b/0x320 [ 1829.241564] io_submit_sqes+0x6fe6/0x8610 [ 1829.242130] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1829.242780] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1829.243417] ? find_held_lock+0x2c/0x110 [ 1829.243951] ? io_submit_sqes+0x8610/0x8610 [ 1829.244527] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1829.245163] ? vfs_write+0x3c5/0xb10 [ 1829.245616] ? wait_for_completion_io+0x270/0x270 [ 1829.246203] ? rcu_read_lock_any_held+0x75/0xa0 [ 1829.246762] ? vfs_write+0x354/0xb10 [ 1829.247214] ? fput_many+0x2f/0x1a0 [ 1829.247656] ? ksys_write+0x1a9/0x260 [ 1829.248116] ? __ia32_sys_read+0xb0/0xb0 [ 1829.248609] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1829.249307] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1829.249979] do_syscall_64+0x33/0x40 [ 1829.250491] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1829.251151] RIP: 0033:0x7fa2cf50cb19 [ 1829.251637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1829.254023] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1829.255015] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1829.255942] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1829.256885] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1829.257815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1829.258737] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:19:50 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:19:50 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 11) 10:19:50 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r6, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:19:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7000000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:19:50 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:19:50 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x0, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:19:50 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:19:51 executing program 4: r0 = clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000006c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff], 0x7}, 0x58) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r1, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r6 = getpgid(r0) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x4, 0x2, 0xa2, 0x0, 0x4, 0x4, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_config_ext={0x4, 0x807}, 0x47802, 0xffffffffffffffff, 0x6, 0x7, 0x56, 0x8, 0xdeab, 0x0, 0x0, 0x0, 0x6}, r6, 0xffffffffffffffff, r2, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r8 = getegid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000440)={{0x1, 0x1, 0x18, r2, {0xee00, r8}}, './file0\x00'}) r9 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r9}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r10 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r3, 0x8000000) r11 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv(r11, &(0x7f0000001400)=[{&(0x7f0000000d40)=""/244, 0x7ffff000}], 0x1, 0x0, 0x0) io_uring_enter(r11, 0x1f7f, 0xff5a, 0x3, &(0x7f0000000140)={[0x8]}, 0x8) syz_io_uring_submit(r10, r5, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r3, 0x8058ab, 0x0, 0x0, 0x0, 0x0) [ 1829.477621] FAULT_INJECTION: forcing a failure. [ 1829.477621] name failslab, interval 1, probability 0, space 0, times 0 [ 1829.479318] CPU: 1 PID: 10409 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1829.480311] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1829.481520] Call Trace: [ 1829.481913] dump_stack+0x107/0x167 [ 1829.482441] should_fail.cold+0x5/0xa [ 1829.482997] ? create_object.isra.0+0x3a/0xa20 [ 1829.483668] should_failslab+0x5/0x20 [ 1829.484235] kmem_cache_alloc+0x5b/0x310 [ 1829.484844] create_object.isra.0+0x3a/0xa20 [ 1829.485427] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1829.486089] kmem_cache_alloc_bulk+0x168/0x320 [ 1829.486696] io_submit_sqes+0x6fe6/0x8610 [ 1829.487236] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1829.487841] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1829.488429] ? find_held_lock+0x2c/0x110 [ 1829.488944] ? io_submit_sqes+0x8610/0x8610 [ 1829.489480] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1829.490067] ? wait_for_completion_io+0x270/0x270 [ 1829.490654] ? rcu_read_lock_any_held+0x75/0xa0 [ 1829.491218] ? vfs_write+0x354/0xb10 [ 1829.491669] ? fput_many+0x2f/0x1a0 [ 1829.492111] ? ksys_write+0x1a9/0x260 [ 1829.492578] ? __ia32_sys_read+0xb0/0xb0 [ 1829.493112] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1829.493749] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1829.494374] do_syscall_64+0x33/0x40 [ 1829.494826] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1829.495445] RIP: 0033:0x7fa2cf50cb19 [ 1829.495911] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1829.498170] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1829.499093] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1829.499957] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1829.500851] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1829.501741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1829.502606] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:19:51 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080)={0x0, 0xfffffffc}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r4, 0x127d, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x7f, 0x2}}, './file0\x00'}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv(r5, &(0x7f0000001400)=[{&(0x7f0000000d40)=""/244, 0x7ffff000}], 0x1, 0x0, 0x0) sendmmsg$inet6(r5, &(0x7f0000000cc0)=[{{&(0x7f00000001c0)={0xa, 0x4e22, 0x8000, @private0={0xfc, 0x0, '\x00', 0x1}, 0x10001}, 0x1c, &(0x7f0000000600)=[{&(0x7f0000000300)="e38d602da161c3c3254fa77e99a40f838cf66550938f964f964284dec9744dfeaa82f375c244fa5649d330206d59605fc24aaf5ef4b2eb9f5d7e61e4330a11d93446056ce280dd800c898b0c6c39efbce2c338224a3cad4bd0d1efe23c077d04605df807ad3a4283dd7e24580d1e9e6deb4d52d5dd2fbcb6e5606a3bd7e515a3348a12243c304d9547e9862035fe55b3a4d4662003fda8b19aaab73cbd77f8fa4c5bb5eaebcf535d9c5a24bb9e584462cef825399c6f46dfcc98f3a12460044b369d6e72ad43450430a127ca030d9861a410b7466c89cf55bcb186b015a5dd90532cfcefd05aad", 0xe7}, {&(0x7f0000000200)="eb4523a140190b107b06da600286f6ac811de7934becfc230e73b885ad4a4ec36ba61941022177ccf448e4d7e754810bf5445cbbc52378eb7f23e2154dcce5572ef9b8b35ce5498b7b87dfcc8c998dff2703fced73fe2f0b5fb317377be18edbc22ca5a1dc648636dbd1f54809bd4cdac4afc7d43f5e9aac4ee4117e45b60be3c06bba02bee6a42bbdfcb399e7", 0x8d}, {&(0x7f0000000500)="fbfabe3d226e3062d2702a32e8622237539f25a74f0195196232dc419bc6411ba72c822ba0044974cb0579519c50bb8e849b6f8f94ef128ab75ee63afd33bea189a48efe663cec1156096a3f51cef7521d63ad870c5dd7c7d9595c5f80f5333e5d19c674399a86cacfaf9fda5244777ba89d28ac56e2ce0e92e8129beef42d24db0db5cc43b702a17ed0d5c01ebae144c11def5343b4ea9211087445d7c98c050f953a60012e9872dc6f235239dca449665db1432a3e2b9d4988348b3867a36edb9224a8305275019226", 0xca}, {&(0x7f0000000400)="6971558a6ad3d0007a8091ee1b04c6584365c288c12c5588bff2e7637c33b90b2f0df3595e54d658cb5500fde274a7cedcf98fc18ae00800686998a08041adef31cf0aeb68531e9de5b9dfc1c72215d246e1841c86a9368084489a8545b2ba", 0x5f}], 0x4, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], 0x2c0}}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000900)="149ad81062c541d3a78eae9779ed777b9eac1665a202045e0e726955529a8df6b1d7a25feaf94357256eff5d586b302918220ebaad226e8f634a860caa2cac36b8d3ba61e1b8", 0x46}, {&(0x7f0000000980)="5edf3498a057e15c23a965dd17b1468dee1ea09f349aec8501db72d0c5407126822df8da4f6263d638126ef733c3c93ed0c18a48f3edb1f2a2911731d672ca557c7624d22739676a9d8b09aaea1b1d0d5adf90cf8218cdbf030a9b4c54a63be9f2e94f338bc2b6baf2eb346e15899e5dc4bf597a0876904c9a256fb89be51ec05a0a3b6a6b52c91af9cb64815797cb3a612c413c0a13938f37a65be4b3af", 0x9e}, {&(0x7f0000000a40)="5ce2aca0af37254e289cdd43d0fcb026857ac805ae5b2660904b0262f888cdecb8fd01f8cd9099e981be8e5764bb2600936de33337", 0x35}, {&(0x7f0000000a80)="7b290875c4aa9c5e2cb24d45418384dbd01e6279cdc1c24efb19413a4dbc1ea8d70ded13e4aaf25351f393365f024daa462c5f007553df2d6287d44ab2ffe82d8b4b680c8db1d3741e67f4ba4227278839", 0x51}], 0x4, &(0x7f0000000b40)=[@dontfrag={{0x14, 0x29, 0x3e, 0x6}}, @hopopts={{0x18, 0x29, 0x36, {0x4}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x5}}, @dontfrag={{0x14, 0x29, 0x3e, 0xffff0001}}, @rthdr_2292={{0x98, 0x29, 0x39, {0x87, 0x10, 0x0, 0xf2, 0x0, [@local, @rand_addr=' \x01\x00', @ipv4={'\x00', '\xff\xff', @private=0xa010102}, @local, @local, @mcast1, @remote, @loopback]}}}, @tclass={{0x14, 0x29, 0x43, 0x6}}, @dstopts={{0x50, 0x29, 0x37, {0x2f, 0x6, '\x00', [@pad1, @enc_lim={0x4, 0x1, 0x5}, @hao={0xc9, 0x10, @mcast1}, @calipso={0x7, 0x10, {0x2, 0x2, 0xc0, 0xbfd8, [0x3625]}}, @jumbo={0xc2, 0x4, 0x1}, @pad1, @ra={0x5, 0x2, 0x3}]}}}], 0x160}}], 0x2, 0x4000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r6, 0x10000000) syz_io_uring_submit(0x0, r7, 0x0, 0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r8, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:19:51 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 12) [ 1829.707322] FAULT_INJECTION: forcing a failure. [ 1829.707322] name failslab, interval 1, probability 0, space 0, times 0 [ 1829.708916] CPU: 1 PID: 10421 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1829.711172] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1829.713571] Call Trace: [ 1829.714290] dump_stack+0x107/0x167 [ 1829.715281] should_fail.cold+0x5/0xa [ 1829.716319] ? create_object.isra.0+0x3a/0xa20 [ 1829.717681] should_failslab+0x5/0x20 [ 1829.718716] kmem_cache_alloc+0x5b/0x310 [ 1829.719809] ? mark_held_locks+0x9e/0xe0 [ 1829.720945] create_object.isra.0+0x3a/0xa20 [ 1829.722147] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1829.723535] kmem_cache_alloc_bulk+0x168/0x320 [ 1829.724787] io_submit_sqes+0x6fe6/0x8610 [ 1829.725407] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1829.726382] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1829.727689] ? find_held_lock+0x2c/0x110 [ 1829.728795] ? io_submit_sqes+0x8610/0x8610 [ 1829.729987] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1829.731333] ? wait_for_completion_io+0x270/0x270 [ 1829.732645] ? rcu_read_lock_any_held+0x75/0xa0 [ 1829.734065] ? vfs_write+0x354/0xb10 [ 1829.735032] ? fput_many+0x2f/0x1a0 [ 1829.735986] ? ksys_write+0x1a9/0x260 [ 1829.737022] ? __ia32_sys_read+0xb0/0xb0 [ 1829.738027] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1829.739337] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1829.740716] do_syscall_64+0x33/0x40 [ 1829.741912] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1829.743310] RIP: 0033:0x7fa2cf50cb19 [ 1829.744325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1829.746863] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1829.747785] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1829.748648] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1829.749566] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1829.750429] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1829.751293] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:19:51 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x0, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:19:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:19:51 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x0, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:19:51 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 13) [ 1829.953969] FAULT_INJECTION: forcing a failure. [ 1829.953969] name failslab, interval 1, probability 0, space 0, times 0 [ 1829.955641] CPU: 1 PID: 10435 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1829.956535] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1829.957614] Call Trace: [ 1829.957967] dump_stack+0x107/0x167 [ 1829.958444] should_fail.cold+0x5/0xa [ 1829.958951] should_failslab+0x5/0x20 [ 1829.959447] kmem_cache_alloc_bulk+0x4b/0x320 [ 1829.960043] io_submit_sqes+0x6fe6/0x8610 [ 1829.960603] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1829.961261] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1829.961888] ? find_held_lock+0x2c/0x110 [ 1829.962420] ? io_submit_sqes+0x8610/0x8610 [ 1829.962999] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1829.963638] ? wait_for_completion_io+0x270/0x270 [ 1829.964276] ? rcu_read_lock_any_held+0x75/0xa0 [ 1829.964894] ? vfs_write+0x354/0xb10 [ 1829.965389] ? fput_many+0x2f/0x1a0 [ 1829.965868] ? ksys_write+0x1a9/0x260 [ 1829.966381] ? __ia32_sys_read+0xb0/0xb0 [ 1829.966916] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1829.967597] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1829.968267] do_syscall_64+0x33/0x40 [ 1829.968760] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1829.969459] RIP: 0033:0x7fa2cf50cb19 [ 1829.969947] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1829.972321] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1829.973337] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1829.974260] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1829.975186] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1829.976115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1829.977114] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:20:04 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:20:04 executing program 4: r0 = clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280)=0x0, {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r1, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) clone3(&(0x7f0000000780)={0x4126000, &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000640), {0x4}, &(0x7f0000000680)=""/79, 0x4f, &(0x7f0000000700)=""/21, &(0x7f0000000740)=[r2, r0], 0x2}, 0x58) r6 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r7 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r7}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r3, 0x8000000) syz_io_uring_submit(r8, r5, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r3, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:20:04 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 14) 10:20:04 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x0, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:20:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8000000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:20:04 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv(r6, &(0x7f0000001400)=[{&(0x7f0000000d40)=""/244, 0x7ffff000}], 0x1, 0x0, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r6, 0x8000000) syz_io_uring_submit(r7, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:20:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:20:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x0, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) [ 1842.681421] FAULT_INJECTION: forcing a failure. [ 1842.681421] name failslab, interval 1, probability 0, space 0, times 0 [ 1842.682993] CPU: 0 PID: 10459 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1842.683889] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1842.684959] Call Trace: [ 1842.685328] dump_stack+0x107/0x167 [ 1842.685775] should_fail.cold+0x5/0xa [ 1842.686238] ? create_object.isra.0+0x3a/0xa20 [ 1842.686792] should_failslab+0x5/0x20 [ 1842.687252] kmem_cache_alloc+0x5b/0x310 [ 1842.687748] ? mark_held_locks+0x9e/0xe0 [ 1842.688242] create_object.isra.0+0x3a/0xa20 [ 1842.688772] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1842.689412] kmem_cache_alloc_bulk+0x168/0x320 [ 1842.689972] io_submit_sqes+0x6fe6/0x8610 [ 1842.690493] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1842.691098] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1842.691686] ? find_held_lock+0x2c/0x110 [ 1842.692184] ? io_submit_sqes+0x8610/0x8610 [ 1842.692719] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1842.693319] ? wait_for_completion_io+0x270/0x270 [ 1842.693914] ? rcu_read_lock_any_held+0x75/0xa0 [ 1842.694477] ? vfs_write+0x354/0xb10 [ 1842.694931] ? fput_many+0x2f/0x1a0 [ 1842.695374] ? ksys_write+0x1a9/0x260 [ 1842.695838] ? __ia32_sys_read+0xb0/0xb0 [ 1842.696335] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1842.696972] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1842.697613] do_syscall_64+0x33/0x40 [ 1842.698066] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1842.698697] RIP: 0033:0x7fa2cf50cb19 [ 1842.699148] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1842.701405] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1842.702331] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1842.703197] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1842.704062] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1842.704927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1842.705809] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:20:16 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 15) 10:20:16 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) r7 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x101800, 0x0) openat(r7, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:20:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x9000000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:20:16 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:20:16 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:20:16 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:20:16 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3eb5, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r4 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r4, 0x660c) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, 0x0, 0x80) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f00000001c0)='./file0/../file0\x00', 0x11, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) kexec_load(0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x40000000, 0x8000000}], 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r4}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000440)=0x1c) 10:20:16 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x0, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) [ 1855.219297] FAULT_INJECTION: forcing a failure. [ 1855.219297] name failslab, interval 1, probability 0, space 0, times 0 [ 1855.220838] CPU: 0 PID: 10482 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1855.225745] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1855.226821] Call Trace: [ 1855.227175] dump_stack+0x107/0x167 [ 1855.227670] should_fail.cold+0x5/0xa [ 1855.228168] ? create_object.isra.0+0x3a/0xa20 [ 1855.228780] should_failslab+0x5/0x20 [ 1855.229273] kmem_cache_alloc+0x5b/0x310 [ 1855.229827] ? mark_held_locks+0x9e/0xe0 [ 1855.230382] create_object.isra.0+0x3a/0xa20 [ 1855.230965] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1855.231645] kmem_cache_alloc_bulk+0x168/0x320 [ 1855.232266] io_submit_sqes+0x6fe6/0x8610 [ 1855.232829] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1855.233489] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1855.234152] ? find_held_lock+0x2c/0x110 [ 1855.234707] ? io_submit_sqes+0x8610/0x8610 [ 1855.235281] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1855.235930] ? wait_for_completion_io+0x270/0x270 [ 1855.236579] ? rcu_read_lock_any_held+0x75/0xa0 [ 1855.237189] ? vfs_write+0x354/0xb10 [ 1855.237710] ? fput_many+0x2f/0x1a0 [ 1855.238204] ? ksys_write+0x1a9/0x260 [ 1855.238719] ? __ia32_sys_read+0xb0/0xb0 [ 1855.239260] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1855.239963] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1855.240642] do_syscall_64+0x33/0x40 [ 1855.241145] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1855.241854] RIP: 0033:0x7fa2cf50cb19 [ 1855.242360] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1855.244734] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1855.250200] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1855.251143] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1855.252071] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1855.252972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1855.253925] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:20:16 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) r7 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv(r7, &(0x7f0000001400)=[{&(0x7f0000000d40)=""/244, 0x7ffff000}], 0x1, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r7, &(0x7f0000000140), 0x2, 0x0) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x101800, 0x0) ftruncate(r8, 0x1) 10:20:16 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 16) [ 1855.418318] FAULT_INJECTION: forcing a failure. [ 1855.418318] name failslab, interval 1, probability 0, space 0, times 0 [ 1855.419878] CPU: 1 PID: 10515 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1855.420712] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1855.421724] Call Trace: [ 1855.422060] dump_stack+0x107/0x167 [ 1855.422501] should_fail.cold+0x5/0xa [ 1855.422965] ? create_object.isra.0+0x3a/0xa20 [ 1855.423520] should_failslab+0x5/0x20 [ 1855.423986] kmem_cache_alloc+0x5b/0x310 [ 1855.424481] ? mark_held_locks+0x9e/0xe0 [ 1855.424977] create_object.isra.0+0x3a/0xa20 [ 1855.425510] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1855.434190] kmem_cache_alloc_bulk+0x168/0x320 [ 1855.434773] io_submit_sqes+0x6fe6/0x8610 [ 1855.435342] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1855.435993] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1855.436621] ? find_held_lock+0x2c/0x110 [ 1855.437157] ? io_submit_sqes+0x8610/0x8610 [ 1855.437742] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1855.438383] ? wait_for_completion_io+0x270/0x270 [ 1855.439004] ? rcu_read_lock_any_held+0x75/0xa0 [ 1855.439597] ? vfs_write+0x354/0xb10 [ 1855.440088] ? fput_many+0x2f/0x1a0 [ 1855.440562] ? ksys_write+0x1a9/0x260 [ 1855.441058] ? __ia32_sys_read+0xb0/0xb0 [ 1855.441598] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1855.442295] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1855.442961] do_syscall_64+0x33/0x40 [ 1855.443446] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1855.444107] RIP: 0033:0x7fa2cf50cb19 [ 1855.444589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1855.446956] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1855.447939] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1855.448854] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1855.449790] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1855.450712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1855.451614] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:20:16 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:20:16 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:20:17 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:20:17 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) [ 1868.493275] FAULT_INJECTION: forcing a failure. [ 1868.493275] name failslab, interval 1, probability 0, space 0, times 0 [ 1868.503022] CPU: 0 PID: 10550 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1868.503930] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1868.505020] Call Trace: [ 1868.505378] dump_stack+0x107/0x167 [ 1868.505862] should_fail.cold+0x5/0xa [ 1868.506388] ? create_object.isra.0+0x3a/0xa20 [ 1868.506997] should_failslab+0x5/0x20 [ 1868.507505] kmem_cache_alloc+0x5b/0x310 [ 1868.508048] ? mark_held_locks+0x9e/0xe0 [ 1868.508591] create_object.isra.0+0x3a/0xa20 [ 1868.509173] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1868.509849] kmem_cache_alloc_bulk+0x168/0x320 [ 1868.510478] io_submit_sqes+0x6fe6/0x8610 [ 1868.511055] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1868.511715] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1868.512358] ? find_held_lock+0x2c/0x110 [ 1868.512902] ? io_submit_sqes+0x8610/0x8610 [ 1868.513484] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1868.514126] ? wait_for_completion_io+0x270/0x270 [ 1868.514787] ? rcu_read_lock_any_held+0x75/0xa0 [ 1868.515404] ? vfs_write+0x354/0xb10 [ 1868.515901] ? fput_many+0x2f/0x1a0 [ 1868.516386] ? ksys_write+0x1a9/0x260 [ 1868.516894] ? __ia32_sys_read+0xb0/0xb0 [ 1868.517438] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1868.518132] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1868.518835] do_syscall_64+0x33/0x40 [ 1868.519331] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1868.520006] RIP: 0033:0x7fa2cf50cb19 [ 1868.520499] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1868.526938] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1868.528710] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1868.529644] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1868.530604] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1868.531539] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1868.532476] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:20:29 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:20:29 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x4, 0xbd6, 0x81, 0x0, 0x0, 0x6}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x127d, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x100000000) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv(r5, &(0x7f0000001400)=[{&(0x7f0000000d40)=""/244, 0x7ffff000}], 0x1, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r6 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r6}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat(r6, &(0x7f0000000140)='./file1\x00', 0x280100, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000640)=0xffffffffffffffff, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:20:29 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) stat(&(0x7f0000000140)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r6) syz_mount_image$nfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x80, 0x4, &(0x7f0000000600)=[{&(0x7f0000000300)="afecd77213882e701e537c02a2e1f21f8be9dab2454fc2d6b9a61ac36c82a6670454477fbdd09d082f81636d8058a38db01548a00321b9bb14fcb7d181fa64031fb9267c53cccb8a181497fa620616ed879ca4f0fff854d86dc020699114115762700f6a06e03fba18e755df80833393d2b3613a28488c620c680124c9713df622382fd58cf8c0872165ea8e54b42521e884b311fe440945c02aea3b195afad94257e780bf6501c9e9bbd2d1f80a6b6239c32c9b18158cef24214d63f342a3912ccb46e9a15bb5a8c7693a2ba1d3640d812fb6cd8d0899285951c3d013fa2401b5563fa4807f8cabf83ae647ae777bf97434622b6bbd", 0xf6, 0xb}, {&(0x7f0000000200)="b9dbd8e71cf27e1e7fb29addd5a7bbca07fc0fa5fa69d55e6b2dd5caa4c1cdeeb2b615554abbbef600dce1067a978ee395c4bc4d4f6785f899d5970fa95c396eeabfd6b8e1ef08c3835ecc2f7247f0b5352f44594b6b51f5f78109486af4ca10d13a9ee3e8b1016dd6678cbe1e8111f3cf3e28b1556978b96fa0dd9601c8ab19c609c32a327eaaeda2b24c", 0x8b, 0x10000}, {&(0x7f0000000400)="beb4fb629dd2ad218026d4e3f1cdfc10343fec15e52d02bc97011a0e3603171d4341fd6a4c69470f4b0cb5cdbecab1404f811aa1d88d26d4f13197603e1d2a12afc7f69568c51d87d8e437ab53d8ef5cf99e7408411d4280379136b330b1f6dc6f8b53d3219c3b54ab5cb5684b8612e69d79c1b74636f58fe0db0bc04834", 0x7e, 0x4}, {&(0x7f0000000500)="dac118ad0668ac6ccf6409d095f2c0e61ca9ee8825713c2d4e9c9b5cc8a7d54c46d822bf9f4df456dad78bd56a5f065a94bf5e9cffa0ff24a0d00c164cfd9a426fe3d464f0fde6652106b76cd39ac1144afd0bea4ce7ea9cbb1550293774d8267c81502aa12879f72386a86e250681e8f1034a16596c38cadc52632e533766019f6a1e977fa034526ed2b8d18a7f867bb269a784873dc16b8d71ed102d93c482a54e6c4dac137171a71282242380b78234bf2790ce3f499f712ceb69980e7dae418f4a9d636e8e83764c009ea8887eb6cdafacdc", 0xd4, 0x100}], 0x1008, &(0x7f0000000680)={[{'\x00'}, {'\x00'}, {'\x00'}, {'\x00'}, {'*}\x18!%:'}, {'-,'}], [{@uid_eq={'uid', 0x3d, r6}}]}) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r7, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:20:29 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:20:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa000000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:20:29 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 17) 10:20:30 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:20:30 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:20:30 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 18) 10:20:30 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:20:30 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:20:30 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1868.699470] FAULT_INJECTION: forcing a failure. [ 1868.699470] name failslab, interval 1, probability 0, space 0, times 0 [ 1868.700969] CPU: 1 PID: 10566 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1868.701836] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1868.702907] Call Trace: [ 1868.703249] dump_stack+0x107/0x167 [ 1868.703707] should_fail.cold+0x5/0xa [ 1868.704192] ? create_object.isra.0+0x3a/0xa20 [ 1868.704796] should_failslab+0x5/0x20 [ 1868.705299] kmem_cache_alloc+0x5b/0x310 10:20:30 executing program 5: clone3(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r5, {0xee01, r6}}, './file1\x00'}) stat(&(0x7f0000000240)='./file1\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r7) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x5003, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r6}}, {@version_L}, {@afid={'afid', 0x3d, 0x4}}, {@dfltuid}, {@privport}, {@mmap}, {@cache_none}], [{@uid_gt={'uid>', r7}}, {@dont_measure}, {@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@seclabel}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@smackfsroot}, {@seclabel}]}}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r9 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r8, 0x10000000) syz_io_uring_submit(0x0, r9, 0x0, 0x0) r10 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r10, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:20:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xb000000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) [ 1868.705812] ? mark_held_locks+0x9e/0xe0 [ 1868.722381] create_object.isra.0+0x3a/0xa20 [ 1868.722962] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1868.723637] kmem_cache_alloc_bulk+0x168/0x320 [ 1868.724239] io_submit_sqes+0x6fe6/0x8610 [ 1868.724816] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1868.725468] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1868.726094] ? find_held_lock+0x2c/0x110 [ 1868.726642] ? io_submit_sqes+0x8610/0x8610 [ 1868.727210] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1868.727837] ? wait_for_completion_io+0x270/0x270 [ 1868.728461] ? rcu_read_lock_any_held+0x75/0xa0 [ 1868.729061] ? vfs_write+0x354/0xb10 [ 1868.729545] ? fput_many+0x2f/0x1a0 [ 1868.730020] ? ksys_write+0x1a9/0x260 [ 1868.730534] ? __ia32_sys_read+0xb0/0xb0 [ 1868.731066] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1868.731743] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1868.732410] do_syscall_64+0x33/0x40 [ 1868.732898] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1868.733563] RIP: 0033:0x7fa2cf50cb19 [ 1868.734050] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1868.736433] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1868.737417] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1868.738339] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1868.739258] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1868.740178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1868.741092] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:20:30 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:20:30 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) io_uring_enter(r4, 0x5b3b, 0xc57c, 0x3, &(0x7f0000000440)={[0x1]}, 0x8) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r6 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r6}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:20:30 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 19) [ 1868.906305] FAULT_INJECTION: forcing a failure. [ 1868.906305] name failslab, interval 1, probability 0, space 0, times 0 [ 1868.907889] CPU: 0 PID: 10587 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1868.908782] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1868.909859] Call Trace: [ 1868.910237] dump_stack+0x107/0x167 [ 1868.910713] should_fail.cold+0x5/0xa [ 1868.911225] ? create_object.isra.0+0x3a/0xa20 [ 1868.911824] should_failslab+0x5/0x20 [ 1868.912337] kmem_cache_alloc+0x5b/0x310 [ 1868.912872] ? mark_held_locks+0x9e/0xe0 [ 1868.913421] create_object.isra.0+0x3a/0xa20 [ 1868.913996] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1868.914695] kmem_cache_alloc_bulk+0x168/0x320 [ 1868.915300] io_submit_sqes+0x6fe6/0x8610 [ 1868.915882] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1868.916529] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1868.917123] ? find_held_lock+0x2c/0x110 [ 1868.917669] ? io_submit_sqes+0x8610/0x8610 [ 1868.918251] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1868.918895] ? wait_for_completion_io+0x270/0x270 [ 1868.919484] ? rcu_read_lock_any_held+0x75/0xa0 [ 1868.920045] ? vfs_write+0x354/0xb10 [ 1868.920497] ? fput_many+0x2f/0x1a0 [ 1868.920938] ? ksys_write+0x1a9/0x260 [ 1868.921401] ? __ia32_sys_read+0xb0/0xb0 [ 1868.921897] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1868.923019] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1868.924287] do_syscall_64+0x33/0x40 [ 1868.925191] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1868.926550] RIP: 0033:0x7fa2cf50cb19 [ 1868.927543] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1868.932524] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1868.934459] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1868.936256] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1868.938011] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1868.939974] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1868.941866] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:20:42 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r5, 0x10000000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000000, 0x80010, r4, 0x0) syz_io_uring_submit(0x0, r6, 0x0, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r7, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:20:42 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 20) 10:20:42 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:20:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x20000000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:20:42 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:20:42 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:20:42 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:20:42 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0)=0xffffffffffffffff, &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r1, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1e1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r7 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r8 = accept4$bt_l2cap(r0, &(0x7f0000000700)={0x1f, 0x0, @none}, &(0x7f0000000740)=0xe, 0x80800) r9 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv(r9, &(0x7f0000001400)=[{&(0x7f0000000d40)=""/244, 0x7ffff000}], 0x1, 0x0, 0x0) r10 = signalfd(r3, &(0x7f0000001880)={[0x9]}, 0x8) r11 = openat$cgroup_ro(r7, &(0x7f0000001a00)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) [ 1881.221922] FAULT_INJECTION: forcing a failure. r12 = openat$hpet(0xffffffffffffff9c, &(0x7f0000001c00), 0x101380, 0x0) io_submit(0x0, 0x7, &(0x7f0000001d80)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000640)="3156280bf9dd444e1350f161f83712a67d2382a98107378377ea7adf2b6397d8a994512b62f81345db1e6b7f0d3de1ef7bd9aa611282af36827fd3a7747847b495fd8500b0da2a9a37a94167a64a463dd7e7c256276c9c01e5fee8a74d9b8215a6b7d5b22d7e15749027b534082c613f001a83b3f7d3af24abdcd536304d36f8a7afc20f2ecd", 0x86, 0x9, 0x0, 0x2}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x1, r8, &(0x7f0000000780)="333e681d2d736588121813afe105adb751610524179ca48c6c1372c26600debb6f5db5225d141da28b4891e3de1b879d0e69ce8670a347233dd05ffadc20de6052ec6492f24657950c4681ae1efc918e1ca50f9995c0f3343855bbfdf7b834be0fca92bdf5eb93006936ea502cf5bc1b86e1702e4b4282cf15b4097a3bacd47de4b7efa0ae1cdad02b7f6ebf41081d4d5169d8abaee64ea065bb5f5c29ec20881d3571adcf6b48762177be9fafbea809", 0xb0, 0x7, 0x0, 0x1, r9}, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x2, 0x66d0, r3, &(0x7f0000000880)="5058266a1f3f92d3502abd3d9dc563135e15acfb14f5c15ec9e5beaa0491b71a37ca53a34acd3c7751606a8cf2e29d68b34f018ea5dd30fb7a1b23b3f3e74cb6c489c832fc855bb4b85b2725a386e0cf3f27b5488c6bd15aefd5158b6b25e01cad171f6daf84618905de7a21083ed932ee4d623f550889c2534c12d063d058ca79ae3bdb868b3aa8b83ec1a9c7be879e3a3e5a76b9d31b796506b78e985f42a3e28546185b93fd2cfb0bfc7c1560729ba607c3a80277dc3fcb2770895b70a50634111aad97955eb621b1d37a9a1c5557f19b0ace70dc0c560708fd335fa9826298710a5f8ac0e1b9c6edbda8b0a07b32ae34191c77b00630f173c5d4e5420790a3c4a5d16fdfec4b95310b58f75a885d1188b5dc2d326b4ccfd688a996da5486dfb6355a4afac4b33898a1be098260171e2f8ce7b905d2360bfbbff51fc141d24e9df8bac3dd80f8f5be905a991c05ee70b44bb25138882f24ca0b2b5be72dfce08d98e73985aec741965c9927326c073cefd93e902f9518770cc2695e51bc0abd2fcdf348c8062c253598702e3571ad0c6345ece00c1fb9526df11acbd955accf244909980ec0828644146c426c4f926e58a343751612241efefaec294ba346ddba078fd23cda5cc0b49e7c96788d435b6eca3b9cbb94cb5c573eb701c0a37c6c0d38586432c5a624017a4f601f7cace44ed572d92999108e0731f98d6dc7155f32f4bf149ece54dabb17183d6d47de2e6e400c1acde91b97010a6fadd63b5903dcadebf415159c5d27c16e0896bbf59069469360dc4b153110c70f5e12d1e8dad92ff78e0e87a05665dd23115d531488a8566e9ea12bdd5ff2589494469d5647961e6af2e40cd95ae108a8f0befa8b118c88adddfae478ac0040612bde4da4d18f93230bcda6e679e298b54bfbb97059bebd72d179c3804749e98c577bec3536d59542723bc0d7157a9395a0aca895d3856cd5756a69af589bcf80922389fca98ec653c7d6a017039920022b037d929440fa5d985cfe2da8d384014cee4207f1964a51c7d7634c0a1e010676895edebbc683f12c80ac2baddb9013aea2c35e312a663105d756941b8b84475900096e1d22dbf737f0de9a7c4b457388e2747bf0491cd8a178830acd6a7ca58c032e2df50daa1ec8016c1da55a5a21188af954679bc8d15442961103eeb977afda457f1cf4f5a6a7943e78141b39c26518edf7d82d7ac64e8bedc10f6a4b4fef1ca3aedefc724c9d5d30dbb0e28b9e834545d94147e7d3a7a2ae1d104ebe49e38bf66cd35e774c29de04b2e138d7b7778dce070d527981505172b93fd8a482a85d6a5ce98287e77afb6be5a221a5ee7ccea888226c6da65b2331aa45b435f7b3fe2bc5ec82cc56825def1723c5027f54e70d3bc1613342259e8823634143b337bd9b4e6a37832b5ee690b5bafc38ccdfcc352e0204cf1c00ec03336fc248d380fe3532b7d56edc4718fb75931677ae92fc46e72925b2ae34114c9e4e1ac7dbeb1626d0eaba84b9933643df610b227e6530809a3a2d660f508ea8911f20aabb409436dea33d0ea2faed52251835e747e577f0a4b211b3094575e919332b347630adf71b661839949337a784c319daf9262a76a78a8be86762b3fa8e02715193353f3bd54388da47b0f2b8df2dd75d1d5cb474d0450255055bb07e5a17bf5ce815cba156b064c117237b2ed1ab976c39c845b3b1f208ed79cb86d5c5c6abc996ad7759ba15ab194aa13f9bdeaa861560d601a3fc557fa6d824294368f9bb7b4e7b0d5767f97fd304bce91ed06d4ccd9b2e23f3d2240079f6661ebea62f4d91d979876109b36fda4587699b5bcf3e43daf709fadec07d2836b3e72ffe0eb419a2b2108edb2723824b0a323ff572d21c14ca2d1d1867350c4c90f6824efe62119908c30e3b61be1f928ffdb9566cb033595e04f36808096e147a51826db09d7c4147eee60dc78d09eaf923106664799fbc59a529e76482f1db0d174174ef40be66fc55576bb535aab069ced09fe85d92691d2f94a3710c592e894603bbcee64f0df7a13390c43ba8fd9a992893755082c20102c379842a2a0fa2103c3e3cf6e75b556cf491ae65548ad7fb6285a7514a4ddcf2519b01fc7ec1ed4f5cac2c69d0f8eccc6d765bcdccd0b728db25a1d173f3db491565ba720023552ea25ea911cf76f89880dc54abe7f4f1d20460c7d53b0da72110847620153568b914e1100436f6d922cfe7618dd4ab93a2ff53c411336d8abf4c503c5b66a8e99356a236b58654d2657c874feb606a3221ac3d4a362ff0653ef1114031db1f7f93302818b583b3579336ab3d77e6b52c75c61684284b0f3d8ed61033793c3dfb46c25e802c558ad37f7513a2e93b851151f7a28012bf23967df092981b44fa3e125ff0bf9319d3fe540d37e07faf541cdc6b1cf1b52d3484e845e6a27845ed7384b25cbea9c6b36ff81e2992bdbfbe464a94005717f00d86cc137f1d96cdb63dd18964f7f9e57f8c18c89523dc442fb3a52e8a8489862cad609cb378b0d227803682f2e5fdb988be7da0c5ca7b8a239f84004ef5154a98bbab4973e44125b27bc797ca0b916be98501db252f8f6bb7750497bf6825650cf77c1f24660866f8d5d70bf90f405fae7be22745cf105f22910864c3ef0351b478c538a088c9e1c789f0c7dc8bdb0fa878c747a5801a7662881beeff665c907abd5271f72866ae999d5c74d5ca9dcbfd20cc69fd33b5c546703b3b34319d411fb8f097dc49ae36cb7c949ff50591abc7e7a5b85151b7aed4f7f768cca0f3ec77d8f1bd16414f9329a59e4a1cb96df675236bf60c74ac623f1183ea17d65d66205898e083ab8499ccd587be8440167dec63de37c8b4c74737840e7172c2896303af21bb39a17c0ace75b761fc71d3967dcde1f061ee21ae6dc0a9c9f84367c0bb8b81f724f0f58a2d34dcc23d45dc71a004b03df7d839cbfcaddd4c3f1c55de48dbd79cdc21ae515806d2b1c328381e51d865f37af132d81d20b1fcadca82333bf79047e1b8d034b55134670dd5be7a4a4cf8a28c4c6fbdd3998d518fb1c7e9b7c9884bbdc5964fdf1c9cfcfe049c526a9d8c39d385fc12423c9daf38e7fd0a55bd6c1da658995eafd9c6de72eab7f213853478e7c7a91868ec28d1e92b34821105d9b6f9822dd72d68281f818223a6440a0f9cfb8e2704c09e6cb4ce44047d3403f97b2986b0e95e85d3e16b432be8399fceac836de709aa1dcc2a3e96ff3a14695371d0e3f9c28549e4fe3105db5d6157bc589cb950d027aae1d452b29f071b6612c793d9330f21f1730687a1091b2fb3a9ab8ae1afb3d177c9dc1a5435eaf86c172f5a8ea6ef09ce3742433902d56b60a36cc0b866dd05fd355d354dae64ccb175186c2bc45a5853a3a3e1ab840bf2b89756125d43f4d43951835c221f5635f6966b87cd7122399a31585c201db06fb8a5ae7b4d304dc5e4b35b642469a949e7bcb19fdbebf5e81a4896bf7946ab8537e4b2edb6b8bcf0b83d8acd763b6b6ad9bdd500b0a970a159b4055cc53bddfbd84d7e3713f98f5f48562886dd129e63967c06c5613dc0a21c13427e6b0f029d016cf7afdf4bf65a99c1071209854aa02a36abf531a3b3853fbdc12fd041c622ba22a5c28892ceba7db2b19e24f253355314d399eb4c7a76c5f5fd8dc0a9152b865c1f3b3f3c7220a5db8adce5082974c8942c570e7b7b8959364d1d31d2224dd6a4e0e422d5dd741740a905cd9c05848c1cdc0e3cc33453bc5e31ce08e32c32ada2d7068dd9311a021c9be7496b3f9674afbb4607e77028b0fc8fc83894c05be6338e44c0996ed016e77175b2ff668b465481d0299f8953979577839d43ba82aeda36a3d2b309169916f56142ac81a3167fc66bbeeb6d0d241f4b5f8cf086b7637c4921706d7d0a2faa43b723aef2a784230b44ce63d8abfb45552c23307d3bf0d0508bc2747ffd3fcc4c297c7665bf0a1f1250493dfad0207733f2c9fb98d0d5a31d739e4a0ba0ae11a7ed645353ccfb701c28ef5fbf36e29d3333c2cb365d44f00f62c0f00d18e27ac341923dde18240285a5eb299af8f38647ce07cd42c94274179a3e182699568374e31c6be78ca04775c4dde45b26591671aee02bfd5c41e5b9965e0deadf3490b0e46e10ff92457535b03a9cfb238e08a43df0649bf3401f399df5bbb9e8f18d17e4fd238c2d73158e1ceab0a23c07592baa77876ac62eb2143a3607a48789f4cbc432020f6cf7c74662672c0c5cb93df8a1e54d9f393a6c9123aeb2bfa75fa77b6d7fe3267c4dcf03179393a7173c870764d5d41daa4c329f59751b28bc5f57aa7995cc7a64f8a1702b77b85c9945d68bc56f27fb9ca4bc0cc908052db20eaa44aa2e3565728daaa4ce1c0fec6554b36d6c28424e2b1979a82f217fbf088c0a231146612fcdda4bb5719f8193292c25f92f5194dbe0851cb264f1e28333bafb995053526e6c00ed69493df29e655617b34525e38da1af4609fd56ab9ed9d80ab596a134615071157ea4e2d984b0d4321e718e833b86ee64b075edadbda0fe18e589451ad963886d7647197144121e3faa48b61f7063d253fab1f2c824ba7cb15ef8467c0cf7e20bc051fe6b5b61e5bbc3d4a85e34bc0ececdd43b99470f795524420c25e413e9f6b3990b1fdb6fa3ee70b402403e0cb0dc13c4b00163beffadfcb9633b5f64ffce03c9f8fe6fc052d6db48bc504e283f2e4442df80cef6b03a38cd71f1ca121c6a27cab4761352d1590ad19ab4edc8efd7cc143c991a1b10986a911b1be9d34f24be7693f92bbb4ee2364641c39d1f9d2ad778e61e7ed2f5784e75a5b653e6ff976cfba2ebb3a4aaeeed634bec2243101e60089349924c76fe05189878af8911cb6ef95d16e181760c3d7861d791a64181773f95eff2672a9874b0ae6c9b6088740a9c9f87a5b02745e7ed5788e41bd79f07b5603f0a9b959322c7b39eac11aa4717d7954eee7dd1ed603f2444d94edc9ba11f5fe94b90f2969f31e4a7f07a31447f087037bcd5171d9315a7a81924332294a854c408cdfcbad26dd78f6db1223ff8fe74533d6b172a587441cd018e1614093ad09c85f8b41d9b0d4acbbc46f08690ab6fecdd8833a9dc1e1b112b057fae8ed67d731d72fa4dc78ab4c0313b97f2ef5fa7e3b156a317fc3f6639c63606ee7d3391bbb68a12f85bcc13bb2895c00d564e3043b8c3a9813dbe9ca153f8a20c617500d09ec24fef981b99b05fb0edb4ec7d187faee700e46a2e5ae7a4c902bafa8f781c1f6e8b991d83d990a56cf1f6f216c028191e8c23c8c5458a4d217c3bd9fb7f23ba60acc1963a3fc5f5e40941e844a7fea461b248d848aa413f5b57b4456e833427c7878684017385954a635a4084f8e39920c210072db5202ddfdee2ba6db52dd7bbeefda7d830800ba192a96aad1a99d6260ca703898d48f23f041cf0ebc6990eba1c75239ff04ec4e49ad76607a62cfe6bb377f1436b7f88cb15be5acc45b6fb56dd58ebe843002414fc324799f658e3c1616a02cacaf2cde117abb79f600ba1b004a0d15f7bc59dc50509b77531017b0861ed40181d62e468c4045035cefe3969fee14fafaf67b36f62cad715eb1423701b59c132d086794e88bac92816329bbe7f6b76854944bbf4eec0308d89a4d76d50c2e05f4777af4297c86fd9353ffb0f96da996d7c99704cb9e9367be732c7654e9924e127620805026a4a7b8e3a4a1b5fb86171c15aca5126c5aea28464b59dd3c5fee5d9052bd6ccdb9ad674ea4ac4b937c1b69a5181b653e97f59", 0x1000, 0x101, 0x0, 0x1, r10}, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x4, r2, &(0x7f0000001900)="ba0f95c6cb04028c1274706d93905d24573790db9c5efe26e07c34d8da5938a3f0200fa92cf39e76b8db5c14132d7d54b3da0e448812b7f93025fcfa8be4daa9d4ee55b0bf21ac876d12da006ac0da6d331df1a1548908861dbde3e475f301c110417719700cc8883ed67cabdcbe107bc1e36bf4c2493f2fea66ac8ff41b6f0d704fed179f1cee03a590d398360fcf9113591a5e374c86f41755e6b5bd918613f6b9efe763fb3d214b00cae6bb596623cd0b205427bfa4d24137f148d8767e721ccdbef15bfe8e08d6e881fc0741e772fef12ce5fe7dafbb8ac097102ac356f8a52529de07c99186e8b5927818f86795b051cc8a77b9627c9f", 0xf9, 0x4, 0x0, 0x3, r11}, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x6, 0x2, r0, &(0x7f0000001a80)="c60158922efefb0561f261ee8a4016eab51022ada8173f660a6da5be924922f6761c0265c5fec3436ae5ee6965658a97ad6dcae888c0adae67c1e2d8bcf8177a7cad798ddea7dc26a25bd580cb9be125c3c54890d7a7c5ac57ffd7d1749f23e69e55570187df83489dc33ff4de303049", 0x70, 0x7, 0x0, 0x2}, &(0x7f0000001bc0)={0x0, 0x0, 0x0, 0x5, 0x7fff, 0xffffffffffffffff, &(0x7f0000001b40)="904f25c009e53c98279afa9d9fb181ee79a0b2342be728a8cd3045140924e478388ccc5bfb1070a56d4114ade6a016033973c3b8bb75ff6e0fdb6fff50646411572ef84fe1db969736daf34fcbb6c2c01b", 0x51, 0x100000001, 0x0, 0x3, r7}, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x6, 0x0, r12, &(0x7f0000001c40)="329154a08f3c25f94101e996d34d461c619a07e60bb103e866240a18f26654e9f3bb09a3f60fb08f0f24f4ddbdf66e8dd232a98600d4c627255f459225c26adc874a43220af65de57f84ba52d28cb4f4558b0d86041c1513caf323c71ed5d21e61530e407bd53e7d82fef81dfa8177cf920c6cff5c9510f7fddbb4159d9f2d734ab7fd4832c58d46455ff453255c6af0d9a20abea0c214eaf7d3a0aa635fadb186d25c9f9791c3dcca262db3aeb03742ad3d87d5a0151ca0cdf196c4e2ca374cb3ca02032276c1bca719a1a593629b566124dd00ab", 0xd5, 0xbe, 0x0, 0x2}]) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r7}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r13 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r3, 0x8000000) syz_io_uring_submit(r13, r5, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r3, 0x8058ab, 0x0, 0x0, 0x0, 0x0) [ 1881.221922] name failslab, interval 1, probability 0, space 0, times 0 [ 1881.231598] CPU: 1 PID: 10613 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1881.232502] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1881.233566] Call Trace: [ 1881.233912] dump_stack+0x107/0x167 [ 1881.234396] should_fail.cold+0x5/0xa [ 1881.234919] ? create_object.isra.0+0x3a/0xa20 [ 1881.235526] should_failslab+0x5/0x20 [ 1881.236024] kmem_cache_alloc+0x5b/0x310 [ 1881.236574] create_object.isra.0+0x3a/0xa20 [ 1881.237143] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1881.237814] kmem_cache_alloc_bulk+0x168/0x320 [ 1881.238423] io_submit_sqes+0x6fe6/0x8610 [ 1881.239025] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1881.239687] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1881.240335] ? find_held_lock+0x2c/0x110 [ 1881.240883] ? io_submit_sqes+0x8610/0x8610 [ 1881.241455] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1881.242708] ? wait_for_completion_io+0x270/0x270 [ 1881.243362] ? rcu_read_lock_any_held+0x75/0xa0 [ 1881.243983] ? vfs_write+0x354/0xb10 [ 1881.244470] ? fput_many+0x2f/0x1a0 [ 1881.244959] ? ksys_write+0x1a9/0x260 [ 1881.245468] ? __ia32_sys_read+0xb0/0xb0 [ 1881.246007] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1881.246725] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1881.247414] do_syscall_64+0x33/0x40 [ 1881.247902] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1881.248578] RIP: 0033:0x7fa2cf50cb19 [ 1881.249070] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1881.251483] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1881.252482] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1881.253411] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1881.254340] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1881.255295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1881.256227] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:20:42 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 21) [ 1881.419496] FAULT_INJECTION: forcing a failure. [ 1881.419496] name failslab, interval 1, probability 0, space 0, times 0 [ 1881.421048] CPU: 0 PID: 10632 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1881.421917] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1881.422936] Call Trace: [ 1881.423261] dump_stack+0x107/0x167 [ 1881.423703] should_fail.cold+0x5/0xa [ 1881.424165] ? create_object.isra.0+0x3a/0xa20 [ 1881.424724] should_failslab+0x5/0x20 [ 1881.425188] kmem_cache_alloc+0x5b/0x310 [ 1881.425682] ? mark_held_locks+0x9e/0xe0 [ 1881.426177] create_object.isra.0+0x3a/0xa20 [ 1881.426746] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1881.427368] kmem_cache_alloc_bulk+0x168/0x320 [ 1881.427927] io_submit_sqes+0x6fe6/0x8610 [ 1881.428448] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1881.429051] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1881.429643] ? find_held_lock+0x2c/0x110 [ 1881.430140] ? io_submit_sqes+0x8610/0x8610 [ 1881.430699] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1881.431293] ? wait_for_completion_io+0x270/0x270 [ 1881.431881] ? rcu_read_lock_any_held+0x75/0xa0 [ 1881.432449] ? vfs_write+0x354/0xb10 [ 1881.432902] ? fput_many+0x2f/0x1a0 [ 1881.433344] ? ksys_write+0x1a9/0x260 [ 1881.433805] ? __ia32_sys_read+0xb0/0xb0 [ 1881.434300] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1881.434985] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1881.435658] do_syscall_64+0x33/0x40 [ 1881.436145] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1881.436809] RIP: 0033:0x7fa2cf50cb19 [ 1881.437292] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1881.439659] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1881.440650] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1881.441579] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1881.442509] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1881.443459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1881.444384] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:20:42 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:20:43 executing program 5: clone3(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r6, 0x10000000) syz_io_uring_submit(0x0, r7, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r9 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r9, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_FEATURES(r8, 0x80189439, &(0x7f00000001c0)) 10:20:43 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:20:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x20100000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:20:43 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x0, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:20:43 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:20:43 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 22) [ 1881.604673] FAULT_INJECTION: forcing a failure. [ 1881.604673] name failslab, interval 1, probability 0, space 0, times 0 [ 1881.606249] CPU: 1 PID: 10647 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1881.607142] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1881.608175] Call Trace: [ 1881.608520] dump_stack+0x107/0x167 [ 1881.608998] should_fail.cold+0x5/0xa [ 1881.609499] ? create_object.isra.0+0x3a/0xa20 [ 1881.610095] should_failslab+0x5/0x20 [ 1881.610598] kmem_cache_alloc+0x5b/0x310 10:20:43 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080)={0x0, 0xdc46, 0x2}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000440)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r6, 0x541d, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r6, 0x8008f512, &(0x7f0000000140)) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) [ 1881.614338] ? mark_held_locks+0x9e/0xe0 [ 1881.614975] create_object.isra.0+0x3a/0xa20 [ 1881.615506] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1881.616124] kmem_cache_alloc_bulk+0x168/0x320 [ 1881.616682] io_submit_sqes+0x6fe6/0x8610 [ 1881.617200] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1881.617802] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1881.618387] ? find_held_lock+0x2c/0x110 [ 1881.618907] ? io_submit_sqes+0x8610/0x8610 [ 1881.619436] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1881.620025] ? wait_for_completion_io+0x270/0x270 [ 1881.620612] ? rcu_read_lock_any_held+0x75/0xa0 [ 1881.621173] ? vfs_write+0x354/0xb10 [ 1881.621625] ? fput_many+0x2f/0x1a0 [ 1881.622073] ? ksys_write+0x1a9/0x260 [ 1881.622534] ? __ia32_sys_read+0xb0/0xb0 [ 1881.623043] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1881.623678] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1881.624304] do_syscall_64+0x33/0x40 [ 1881.624754] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1881.625375] RIP: 0033:0x7fa2cf50cb19 [ 1881.625826] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1881.628397] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1881.629518] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1881.630614] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1881.631678] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1881.632739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1881.633876] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:20:43 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 23) 10:20:43 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) io_uring_enter(r0, 0xfc4, 0x2f5d, 0x1, &(0x7f0000000280)={[0x400]}, 0x8) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) syz_io_uring_setup(0x19ea, &(0x7f00000001c0)={0x0, 0x9d54, 0x2, 0x0, 0x183, 0x0, r0}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000140), &(0x7f0000000240)) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:20:43 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:20:43 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r5, 0x127d, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000440)) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r1, 0x40089413, &(0x7f0000000140)=0x8) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r6 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x1c9b, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1af, 0x0, r6}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) rt_sigtimedwait(&(0x7f0000000640)={[0x3]}, &(0x7f0000000680), &(0x7f0000000700)={0x0, 0x3938700}, 0x8) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) [ 1881.892700] FAULT_INJECTION: forcing a failure. [ 1881.892700] name failslab, interval 1, probability 0, space 0, times 0 [ 1881.894217] CPU: 1 PID: 10663 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1881.895073] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1881.896080] Call Trace: [ 1881.896406] dump_stack+0x107/0x167 [ 1881.896851] should_fail.cold+0x5/0xa [ 1881.897323] ? memcg_alloc_page_obj_cgroups+0x73/0x100 [ 1881.897963] should_failslab+0x5/0x20 [ 1881.898427] __kmalloc_node+0x76/0x420 [ 1881.898919] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 1881.899537] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 1881.900148] kmem_cache_alloc_bulk+0x182/0x320 [ 1881.900709] io_submit_sqes+0x6fe6/0x8610 [ 1881.901232] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1881.901836] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1881.902426] ? find_held_lock+0x2c/0x110 [ 1881.902943] ? io_submit_sqes+0x8610/0x8610 [ 1881.903477] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1881.904066] ? wait_for_completion_io+0x270/0x270 [ 1881.904655] ? rcu_read_lock_any_held+0x75/0xa0 [ 1881.905218] ? vfs_write+0x354/0xb10 [ 1881.905671] ? fput_many+0x2f/0x1a0 [ 1881.906114] ? ksys_write+0x1a9/0x260 [ 1881.906577] ? __ia32_sys_read+0xb0/0xb0 [ 1881.907087] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1881.907725] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1881.908355] do_syscall_64+0x33/0x40 [ 1881.908807] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1881.909432] RIP: 0033:0x7fa2cf50cb19 [ 1881.909884] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1881.912139] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1881.913065] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1881.913941] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1881.914818] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1881.915688] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1881.916559] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:20:43 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:20:43 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x0, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1894.446016] FAULT_INJECTION: forcing a failure. [ 1894.446016] name failslab, interval 1, probability 0, space 0, times 0 [ 1894.447463] CPU: 1 PID: 10694 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1894.448302] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1894.449303] Call Trace: [ 1894.449630] dump_stack+0x107/0x167 [ 1894.450074] should_fail.cold+0x5/0xa [ 1894.450539] ? create_object.isra.0+0x3a/0xa20 [ 1894.451129] should_failslab+0x5/0x20 [ 1894.451634] kmem_cache_alloc+0x5b/0x310 [ 1894.452165] ? mark_held_locks+0x9e/0xe0 [ 1894.452699] create_object.isra.0+0x3a/0xa20 [ 1894.453268] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1894.453929] kmem_cache_alloc_bulk+0x168/0x320 [ 1894.454527] io_submit_sqes+0x6fe6/0x8610 [ 1894.455102] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1894.455754] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1894.456384] ? find_held_lock+0x2c/0x110 [ 1894.456921] ? io_submit_sqes+0x8610/0x8610 [ 1894.457496] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1894.458129] ? wait_for_completion_io+0x270/0x270 [ 1894.458761] ? rcu_read_lock_any_held+0x75/0xa0 [ 1894.459377] ? vfs_write+0x354/0xb10 [ 1894.459862] ? fput_many+0x2f/0x1a0 [ 1894.460340] ? ksys_write+0x1a9/0x260 [ 1894.460837] ? __ia32_sys_read+0xb0/0xb0 [ 1894.461375] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1894.462052] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1894.462719] do_syscall_64+0x33/0x40 [ 1894.463216] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1894.463879] RIP: 0033:0x7fa2cf50cb19 [ 1894.464370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1894.466740] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1894.467738] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1894.468653] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1894.469568] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1894.470486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1894.471430] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:20:55 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:20:55 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r2 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, r1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r6 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r6}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) syz_io_uring_submit(r7, r4, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r2, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:20:55 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 24) 10:20:55 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:20:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2e000000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:20:56 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:20:56 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x42a3, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:20:56 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x0, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:20:56 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 25) 10:20:56 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) clone3(&(0x7f00000005c0)={0x200001000, &(0x7f0000000440), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f0000000640)=""/76, 0x4c, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r1, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r6 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r6}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) syz_io_uring_submit(r7, r4, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r2, 0x8058ab, 0x0, 0x0, 0x0, 0x0) [ 1894.659598] FAULT_INJECTION: forcing a failure. [ 1894.659598] name failslab, interval 1, probability 0, space 0, times 0 [ 1894.661206] CPU: 1 PID: 10725 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1894.662102] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1894.663191] Call Trace: [ 1894.663541] dump_stack+0x107/0x167 [ 1894.664021] should_fail.cold+0x5/0xa [ 1894.664518] ? create_object.isra.0+0x3a/0xa20 [ 1894.665115] should_failslab+0x5/0x20 [ 1894.665613] kmem_cache_alloc+0x5b/0x310 [ 1894.666144] ? mark_held_locks+0x9e/0xe0 [ 1894.666677] create_object.isra.0+0x3a/0xa20 [ 1894.667272] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1894.667939] kmem_cache_alloc_bulk+0x168/0x320 [ 1894.668544] io_submit_sqes+0x6fe6/0x8610 [ 1894.669109] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1894.669762] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1894.670394] ? io_submit_sqes+0x8610/0x8610 [ 1894.670912] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1894.671521] ? wait_for_completion_io+0x270/0x270 [ 1894.672126] ? ksys_write+0x144/0x260 [ 1894.672616] ? fput_many+0x2f/0x1a0 [ 1894.673095] ? ksys_write+0x1a9/0x260 [ 1894.673594] ? __ia32_sys_read+0xb0/0xb0 [ 1894.674133] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1894.674817] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1894.675499] do_syscall_64+0x33/0x40 [ 1894.675981] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1894.676616] RIP: 0033:0x7fa2cf50cb19 [ 1894.677067] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1894.679340] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1894.680331] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1894.681256] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1894.682170] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1894.683038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1894.684092] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:20:56 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000009, 0x12, r4, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r5, 0x10000000) syz_io_uring_submit(0x0, r6, 0x0, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r7, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd=r3, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r8, 0x541d, 0x0) ioctl$AUTOFS_IOC_CATATONIC(r8, 0x9362, 0x0) 10:20:56 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:20:56 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:20:56 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x0, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:21:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x3f000000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:21:09 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 26) 10:21:09 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:21:09 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x0, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:21:09 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x0, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:21:09 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080)={0x0, 0x0, 0x10}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x2, 0x2, 0x4, 0x40, 0x0, 0x7, 0x2a148, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x40, 0x2, @perf_config_ext={0x3f}, 0x11402, 0x10000, 0x401, 0x3, 0x10001, 0x5, 0x9, 0x0, 0x9, 0x0, 0x4}, r0, 0xa, r1, 0x1) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x40000022}, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$EXT4_IOC_GET_ES_CACHE(r6, 0xc020662a, &(0x7f00000006c0)={0x5, 0x8, 0x4, 0x200, 0x7, [{0x8, 0x3ff, 0x1, '\x00', 0x80a}, {0x7, 0x8, 0x5, '\x00', 0x280}, {0x8000, 0x7, 0x401, '\x00', 0x1384}, {0x1, 0x0, 0xfffffffffffffff7, '\x00', 0x2000}, {0xb3, 0xfffffffffffff9e9, 0x101, '\x00', 0xc01}, {0x4, 0x400, 0x800, '\x00', 0x1200}, {0x7fff, 0x1ff, 0x9, '\x00', 0x80}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r7 = dup3(r1, r2, 0x80000) io_uring_enter(r7, 0x38d6, 0xcbb3, 0x3, &(0x7f0000000140)={[0x100]}, 0x8) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) syz_io_uring_submit(r8, r4, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r2, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:21:09 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x1, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000240), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) io_uring_enter(r5, 0x43fd, 0x761f, 0x0, &(0x7f0000000140)={[0xbed]}, 0x8) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r5, 0x10000000) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, 0xffffffffffffffff, 0x10000000) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r7, &(0x7f0000000480)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000440)=0x80, &(0x7f0000000840)=@qipcrtr, 0x0, 0x0, 0x0, {0x0, r8}}, 0x81) syz_io_uring_submit(0x0, r7, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x3, 0x0, @fd, 0x3, 0x0, 0x9}, 0x3) syz_io_uring_submit(r4, r7, &(0x7f0000000200)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x1, 0x0, r5, &(0x7f00000001c0)={0x10}, r5, 0x1, 0x0, 0x1}, 0x3) syz_io_uring_submit(0x0, r6, 0x0, 0x0) r9 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r9, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:21:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) [ 1908.063082] FAULT_INJECTION: forcing a failure. [ 1908.063082] name failslab, interval 1, probability 0, space 0, times 0 [ 1908.064716] CPU: 0 PID: 10750 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1908.065606] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1908.066676] Call Trace: [ 1908.067023] dump_stack+0x107/0x167 [ 1908.067509] should_fail.cold+0x5/0xa [ 1908.068027] ? create_object.isra.0+0x3a/0xa20 [ 1908.068636] should_failslab+0x5/0x20 [ 1908.069134] kmem_cache_alloc+0x5b/0x310 [ 1908.069686] ? mark_held_locks+0x9e/0xe0 [ 1908.070221] create_object.isra.0+0x3a/0xa20 [ 1908.070813] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1908.071480] kmem_cache_alloc_bulk+0x168/0x320 [ 1908.072116] io_submit_sqes+0x6fe6/0x8610 [ 1908.072689] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1908.073349] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1908.073981] ? find_held_lock+0x2c/0x110 [ 1908.074529] ? io_submit_sqes+0x8610/0x8610 [ 1908.075105] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1908.075772] ? wait_for_completion_io+0x270/0x270 [ 1908.076424] ? rcu_read_lock_any_held+0x75/0xa0 [ 1908.077030] ? vfs_write+0x354/0xb10 [ 1908.077535] ? fput_many+0x2f/0x1a0 [ 1908.078015] ? ksys_write+0x1a9/0x260 [ 1908.078535] ? __ia32_sys_read+0xb0/0xb0 [ 1908.079072] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1908.079786] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1908.080470] do_syscall_64+0x33/0x40 [ 1908.080972] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1908.081639] RIP: 0033:0x7fa2cf50cb19 [ 1908.082139] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1908.084744] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1908.085842] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1908.086862] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1908.087748] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1908.088614] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1908.089480] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 [ 1908.099760] audit: type=1400 audit(1738578069.641:72): avc: denied { read } for pid=10757 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 10:21:09 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 27) 10:21:09 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x0, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:21:09 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x4000, 0x0, 0x0, 0x1af, 0x0, r1}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0xbad) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) [ 1908.308723] FAULT_INJECTION: forcing a failure. [ 1908.308723] name failslab, interval 1, probability 0, space 0, times 0 [ 1908.310284] CPU: 0 PID: 10780 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1908.311126] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1908.312179] Call Trace: [ 1908.312506] dump_stack+0x107/0x167 [ 1908.312956] should_fail.cold+0x5/0xa [ 1908.313423] ? create_object.isra.0+0x3a/0xa20 [ 1908.313985] should_failslab+0x5/0x20 [ 1908.314453] kmem_cache_alloc+0x5b/0x310 [ 1908.314951] ? mark_held_locks+0x9e/0xe0 [ 1908.315450] create_object.isra.0+0x3a/0xa20 [ 1908.316009] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1908.316632] kmem_cache_alloc_bulk+0x168/0x320 [ 1908.317197] io_submit_sqes+0x6fe6/0x8610 [ 1908.317722] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1908.318331] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1908.318927] ? find_held_lock+0x2c/0x110 [ 1908.319428] ? io_submit_sqes+0x8610/0x8610 [ 1908.319978] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1908.320570] ? wait_for_completion_io+0x270/0x270 [ 1908.321162] ? rcu_read_lock_any_held+0x75/0xa0 [ 1908.321730] ? vfs_write+0x354/0xb10 [ 1908.322185] ? fput_many+0x2f/0x1a0 [ 1908.322630] ? ksys_write+0x1a9/0x260 [ 1908.323097] ? __ia32_sys_read+0xb0/0xb0 [ 1908.323607] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1908.324248] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1908.324880] do_syscall_64+0x33/0x40 [ 1908.325335] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1908.325961] RIP: 0033:0x7fa2cf50cb19 [ 1908.326415] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1908.328673] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1908.329604] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1908.330473] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1908.331342] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1908.336230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1908.337095] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:21:22 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x810, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:21:22 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 28) 10:21:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x0, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:21:22 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0xfffffffffffffedc, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv(r1, &(0x7f0000001400)=[{&(0x7f0000000d40)=""/244, 0x7ffff000}], 0x1, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r6 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r6}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x7) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) r8 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r8, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x80, 0x8, 0x3, 0x42, 0x0, 0x8d, 0x10400, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_config_ext={0x6, 0x1}, 0x2, 0x10000, 0x309a, 0x2, 0x20, 0x20, 0x7, 0x0, 0xbad, 0x0, 0x8}, 0x0, 0x9, r8, 0xa) syz_open_procfs(0x0, &(0x7f0000000440)='attr/fscreate\x00') syz_io_uring_submit(r7, r4, &(0x7f00000002c0)=@IORING_OP_WRITE_FIXED={0x5, 0x4, 0x6000, @fd_index=0x8, 0x7ff, 0x0, 0x6, 0x1a, 0x1, {0x3}}, 0x7ffffffe) io_uring_enter(r2, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:21:22 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:21:22 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x0, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:21:22 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:21:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x40000000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) [ 1920.819386] FAULT_INJECTION: forcing a failure. [ 1920.819386] name failslab, interval 1, probability 0, space 0, times 0 [ 1920.820810] CPU: 0 PID: 10792 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1920.821645] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1920.822651] Call Trace: [ 1920.822979] dump_stack+0x107/0x167 [ 1920.823423] should_fail.cold+0x5/0xa [ 1920.823897] should_failslab+0x5/0x20 [ 1920.824379] kmem_cache_alloc_bulk+0x4b/0x320 [ 1920.824933] io_submit_sqes+0x6fe6/0x8610 [ 1920.825457] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1920.826065] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1920.826663] ? find_held_lock+0x2c/0x110 [ 1920.827162] ? io_submit_sqes+0x8610/0x8610 [ 1920.827696] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1920.832315] ? wait_for_completion_io+0x270/0x270 [ 1920.832905] ? rcu_read_lock_any_held+0x75/0xa0 [ 1920.833470] ? vfs_write+0x354/0xb10 [ 1920.833922] ? fput_many+0x2f/0x1a0 [ 1920.834365] ? ksys_write+0x1a9/0x260 [ 1920.834827] ? __ia32_sys_read+0xb0/0xb0 [ 1920.835325] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1920.835984] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1920.836621] do_syscall_64+0x33/0x40 [ 1920.837073] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1920.837696] RIP: 0033:0x7fa2cf50cb19 [ 1920.838150] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1920.840406] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1920.841330] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1920.842197] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1920.843068] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1920.843934] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1920.844822] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:21:22 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r5, 0x127d, 0x0) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000140)={0x3, 0x8000}, 0x4) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r6, 0x0, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r7, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:21:22 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 29) 10:21:22 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x1, 0x0, 0x0}, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r6, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:21:22 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0x0, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) [ 1920.980489] FAULT_INJECTION: forcing a failure. [ 1920.980489] name failslab, interval 1, probability 0, space 0, times 0 [ 1920.982018] CPU: 0 PID: 10821 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1920.982857] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1920.983860] Call Trace: [ 1920.984216] dump_stack+0x107/0x167 [ 1920.984661] should_fail.cold+0x5/0xa [ 1920.985132] ? create_object.isra.0+0x3a/0xa20 [ 1920.985694] should_failslab+0x5/0x20 [ 1920.986161] kmem_cache_alloc+0x5b/0x310 [ 1920.986663] create_object.isra.0+0x3a/0xa20 [ 1920.987198] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1920.987821] kmem_cache_alloc_bulk+0x168/0x320 [ 1920.992412] io_submit_sqes+0x6fe6/0x8610 [ 1920.992934] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1920.993537] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1920.994123] ? find_held_lock+0x2c/0x110 [ 1920.994619] ? io_submit_sqes+0x8610/0x8610 [ 1920.995150] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1920.995736] ? wait_for_completion_io+0x270/0x270 [ 1920.996339] ? rcu_read_lock_any_held+0x75/0xa0 [ 1920.996903] ? vfs_write+0x354/0xb10 [ 1920.997355] ? fput_many+0x2f/0x1a0 [ 1920.997798] ? ksys_write+0x1a9/0x260 [ 1920.998260] ? __ia32_sys_read+0xb0/0xb0 [ 1920.998758] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1920.999399] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1921.000044] do_syscall_64+0x33/0x40 [ 1921.000497] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1921.001120] RIP: 0033:0x7fa2cf50cb19 [ 1921.001573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1921.003803] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1921.004743] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1921.005615] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1921.006481] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1921.007350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1921.012245] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:21:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0x0, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:21:22 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:21:22 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r4, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file1\x00'}) io_uring_enter(r5, 0x21a3, 0xe3, 0x1, &(0x7f00000001c0)={[0x5]}, 0x8) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r6, 0x10000000) syz_io_uring_submit(0x0, r7, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x6, 0x50, r4, 0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r8, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:21:22 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 30) 10:21:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x48000000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:21:22 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x0, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) [ 1921.112565] FAULT_INJECTION: forcing a failure. [ 1921.112565] name failslab, interval 1, probability 0, space 0, times 0 [ 1921.114024] CPU: 0 PID: 10840 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1921.114863] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1921.115866] Call Trace: [ 1921.116213] dump_stack+0x107/0x167 [ 1921.116659] should_fail.cold+0x5/0xa [ 1921.117128] ? create_object.isra.0+0x3a/0xa20 [ 1921.117688] should_failslab+0x5/0x20 [ 1921.118161] kmem_cache_alloc+0x5b/0x310 [ 1921.118659] ? mark_held_locks+0x9e/0xe0 [ 1921.119160] create_object.isra.0+0x3a/0xa20 [ 1921.119694] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1921.120343] kmem_cache_alloc_bulk+0x168/0x320 [ 1921.120904] io_submit_sqes+0x6fe6/0x8610 [ 1921.121427] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1921.122030] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1921.122616] ? find_held_lock+0x2c/0x110 [ 1921.123112] ? io_submit_sqes+0x8610/0x8610 [ 1921.123643] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1921.124247] ? wait_for_completion_io+0x270/0x270 [ 1921.124837] ? rcu_read_lock_any_held+0x75/0xa0 [ 1921.125400] ? vfs_write+0x354/0xb10 [ 1921.125854] ? fput_many+0x2f/0x1a0 [ 1921.126298] ? ksys_write+0x1a9/0x260 [ 1921.126760] ? __ia32_sys_read+0xb0/0xb0 [ 1921.127256] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1921.127891] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1921.128530] do_syscall_64+0x33/0x40 [ 1921.128982] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1921.129604] RIP: 0033:0x7fa2cf50cb19 [ 1921.130056] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1921.132300] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1921.133231] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1921.134097] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1921.134963] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1921.135828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1921.136719] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:21:22 executing program 4: r0 = clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280)=0x0, {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r1, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x40000022}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r9, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x80, 0x8, 0x3, 0x42, 0x0, 0x8d, 0x10400, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_config_ext={0x6, 0x1}, 0x2, 0x10000, 0x309a, 0x2, 0x20, 0x20, 0x7, 0x0, 0xbad, 0x0, 0x8}, r8, 0x9, r9, 0xa) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000001740)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) clone3(&(0x7f0000001780)={0x800480, &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000640), {0x17}, &(0x7f0000000680)=""/47, 0x2f, &(0x7f00000006c0)=""/4096, &(0x7f0000001700)=[r2, r0, 0x0, r2, r8], 0x5, {r10}}, 0x58) r11 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r11}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r12 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r4, 0x8000000) syz_io_uring_submit(r12, r6, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r4, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:21:22 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) io_uring_enter(r0, 0x25cb, 0xfc2b, 0x3, &(0x7f0000000140)={[0xfffffffffffffff8]}, 0x8) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_setup(0x71c1, &(0x7f00000001c0)={0x0, 0x625c, 0x1, 0x2, 0xd9}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000280)) syz_io_uring_complete(r7) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:21:22 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 31) [ 1921.267899] FAULT_INJECTION: forcing a failure. [ 1921.267899] name failslab, interval 1, probability 0, space 0, times 0 [ 1921.269348] CPU: 1 PID: 10854 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1921.270186] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1921.271185] Call Trace: [ 1921.271511] dump_stack+0x107/0x167 [ 1921.271954] should_fail.cold+0x5/0xa [ 1921.272484] ? create_object.isra.0+0x3a/0xa20 [ 1921.273042] should_failslab+0x5/0x20 [ 1921.273504] kmem_cache_alloc+0x5b/0x310 [ 1921.273997] ? mark_held_locks+0x9e/0xe0 [ 1921.274492] create_object.isra.0+0x3a/0xa20 [ 1921.275021] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1921.275642] kmem_cache_alloc_bulk+0x168/0x320 [ 1921.276236] io_submit_sqes+0x6fe6/0x8610 [ 1921.276758] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1921.277360] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1921.277947] ? find_held_lock+0x2c/0x110 [ 1921.278447] ? io_submit_sqes+0x8610/0x8610 [ 1921.278977] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1921.279565] ? wait_for_completion_io+0x270/0x270 [ 1921.280187] ? rcu_read_lock_any_held+0x75/0xa0 [ 1921.280748] ? vfs_write+0x354/0xb10 [ 1921.281201] ? fput_many+0x2f/0x1a0 [ 1921.281644] ? ksys_write+0x1a9/0x260 [ 1921.282104] ? __ia32_sys_read+0xb0/0xb0 [ 1921.282599] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1921.283233] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1921.283857] do_syscall_64+0x33/0x40 [ 1921.284340] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1921.284962] RIP: 0033:0x7fa2cf50cb19 [ 1921.285414] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1921.287638] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1921.288580] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1921.289444] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1921.290307] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1921.291169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1921.292069] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:21:35 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0x0, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:21:35 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 32) 10:21:35 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0xffffffffffff0001, 0x9}, 0x0, 0x3, 0x81, 0x0, 0x0, 0x80000000}, r0, 0x2, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x3eb5, &(0x7f00000008c0)={0x0, 0xddc4, 0x2}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r6 = syz_open_dev$vcsn(&(0x7f0000000140), 0x5, 0x80000) syz_io_uring_setup(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x1b2}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100)=0x0, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000440)=0x80, &(0x7f0000000840)=@qipcrtr}, 0x81) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x3, 0x0, @fd_index, 0x1, 0x0, 0x9}, 0x3) syz_io_uring_submit(r7, 0x0, &(0x7f0000000440)=@IORING_OP_WRITE_FIXED={0x5, 0x3, 0x4000, @fd_index=0x6, 0xff, 0x401, 0x2, 0x10, 0x1, {0x1}}, 0x6) syz_io_uring_submit(0x0, r4, &(0x7f00000006c0)=@IORING_OP_WRITE={0x17, 0x0, 0x6000, @fd_index, 0x0, 0x0}, 0x0) r9 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) syz_io_uring_submit(r9, r4, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r8, 0xc018937d, &(0x7f0000000700)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="af0c0000000000002e2f66696c6530000f2c816261c2d709646d3f866d6d4aa6538c1868fea1f4f268d1ede238527d6deca535d32cf57dc132f1da74130145538375a53bb6938d88294026e31c0561abf04438601601b069c766b47c34c9becae184054bd76dd22237f538e3ebf3a4b49b24f3343fcbbcf30dc82483ee78a49eeb9d77befb29d5715680b03b142fcae7a6e297a77253360f6dce7558ab10f208c684f204c4594bffc90dabbceee729d36af621b574"]) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r10, 0xc0189374, &(0x7f0000000380)={{0x1, 0x1, 0x18, r6, {0x3}}, './file0/file0\x00'}) io_uring_enter(r2, 0x8058ab, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000003, 0x100010, r5, 0x3580b000) 10:21:35 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:21:35 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x80, 0x8, 0x3, 0x42, 0x0, 0x8d, 0x10400, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_config_ext={0x6, 0x1}, 0x2, 0x10000, 0x309a, 0x2, 0x20, 0x20, 0x7, 0x0, 0xbad, 0x0, 0x8}, 0x0, 0x9, r3, 0xa) r4 = signalfd(r0, &(0x7f0000000140)={[0x3]}, 0x8) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x6, 0x18, 0x1, 0x0, 0x0, 0x2, 0x20000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x4, @perf_config_ext={0xc95, 0x7}, 0x1212, 0x33, 0x7f, 0x8, 0xffff, 0x8, 0x828b, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0xf, r4, 0xa) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r7, 0x10000000) syz_io_uring_submit(0x0, r8, 0x0, 0x0) r9 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r9, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd=r6, 0x7fff, 0x0, 0x5}, 0x80100001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:21:35 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x0, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) [ 1933.920599] FAULT_INJECTION: forcing a failure. [ 1933.920599] name failslab, interval 1, probability 0, space 0, times 0 [ 1933.922068] CPU: 0 PID: 10877 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1933.922905] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1933.923907] Call Trace: 10:21:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4c000000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:21:35 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0x0, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) [ 1933.924233] dump_stack+0x107/0x167 [ 1933.932797] should_fail.cold+0x5/0xa [ 1933.933266] ? create_object.isra.0+0x3a/0xa20 [ 1933.933826] should_failslab+0x5/0x20 [ 1933.934292] kmem_cache_alloc+0x5b/0x310 [ 1933.934795] ? mark_held_locks+0x9e/0xe0 [ 1933.935290] create_object.isra.0+0x3a/0xa20 [ 1933.935825] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1933.936459] kmem_cache_alloc_bulk+0x168/0x320 [ 1933.937023] io_submit_sqes+0x6fe6/0x8610 [ 1933.937545] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1933.938153] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1933.938743] ? find_held_lock+0x2c/0x110 [ 1933.939241] ? io_submit_sqes+0x8610/0x8610 [ 1933.939775] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1933.940364] ? wait_for_completion_io+0x270/0x270 [ 1933.940972] ? rcu_read_lock_any_held+0x75/0xa0 [ 1933.941536] ? vfs_write+0x354/0xb10 [ 1933.941991] ? fput_many+0x2f/0x1a0 [ 1933.942436] ? ksys_write+0x1a9/0x260 [ 1933.942902] ? __ia32_sys_read+0xb0/0xb0 [ 1933.943400] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1933.944039] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1933.944679] do_syscall_64+0x33/0x40 [ 1933.945133] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1933.945760] RIP: 0033:0x7fa2cf50cb19 [ 1933.946219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1933.948504] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1933.949435] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1933.950320] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1933.951204] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1933.952084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1933.956984] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:21:35 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 33) 10:21:35 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_bp={&(0x7f0000000840), 0x1}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r5 = syz_io_uring_setup(0x4000, &(0x7f0000000340)={0x0, 0x0, 0x4, 0x3, 0x1b2, 0x0, r1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100)=0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x127d, 0x0) syz_io_uring_setup(0x46bf, &(0x7f0000000740)={0x0, 0xdbec, 0x2, 0x0, 0x33e}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f00000007c0), &(0x7f0000000800)) syz_io_uring_submit(r6, 0x0, &(0x7f0000000440)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000140), r5, 0x3, 0x0, 0x1cd56d12cc6cda2e}, 0x81) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000680), 0x0, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000640)='./file0\x00', 0xda) [ 1934.076673] FAULT_INJECTION: forcing a failure. [ 1934.076673] name failslab, interval 1, probability 0, space 0, times 0 [ 1934.078226] CPU: 0 PID: 10905 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1934.079065] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1934.080069] Call Trace: [ 1934.080397] dump_stack+0x107/0x167 [ 1934.080861] should_fail.cold+0x5/0xa [ 1934.081331] ? create_object.isra.0+0x3a/0xa20 [ 1934.081892] should_failslab+0x5/0x20 [ 1934.082360] kmem_cache_alloc+0x5b/0x310 [ 1934.082858] ? mark_held_locks+0x9e/0xe0 [ 1934.083357] create_object.isra.0+0x3a/0xa20 [ 1934.083893] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1934.084534] kmem_cache_alloc_bulk+0x168/0x320 [ 1934.085099] io_submit_sqes+0x6fe6/0x8610 [ 1934.085625] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1934.086235] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1934.086827] ? find_held_lock+0x2c/0x110 [ 1934.087326] ? io_submit_sqes+0x8610/0x8610 [ 1934.087862] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1934.088463] ? wait_for_completion_io+0x270/0x270 [ 1934.089063] ? rcu_read_lock_any_held+0x75/0xa0 [ 1934.089631] ? vfs_write+0x354/0xb10 [ 1934.090087] ? fput_many+0x2f/0x1a0 [ 1934.090532] ? ksys_write+0x1a9/0x260 [ 1934.090999] ? __ia32_sys_read+0xb0/0xb0 [ 1934.091498] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1934.092140] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1934.092788] do_syscall_64+0x33/0x40 [ 1934.093245] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1934.093870] RIP: 0033:0x7fa2cf50cb19 [ 1934.094325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1934.096580] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1934.097512] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1934.098384] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1934.099257] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1934.100128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1934.101016] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:21:35 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0x0, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:21:35 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x0, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) [ 1952.566678] FAULT_INJECTION: forcing a failure. [ 1952.566678] name failslab, interval 1, probability 0, space 0, times 0 [ 1952.570258] CPU: 1 PID: 10936 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1952.572244] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1952.574674] Call Trace: [ 1952.575424] dump_stack+0x107/0x167 [ 1952.576459] should_fail.cold+0x5/0xa [ 1952.585636] ? create_object.isra.0+0x3a/0xa20 [ 1952.586951] should_failslab+0x5/0x20 [ 1952.588041] kmem_cache_alloc+0x5b/0x310 [ 1952.590261] ? mark_held_locks+0x9e/0xe0 [ 1952.590761] create_object.isra.0+0x3a/0xa20 [ 1952.591292] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1952.591910] kmem_cache_alloc_bulk+0x168/0x320 [ 1952.592468] io_submit_sqes+0x6fe6/0x8610 [ 1952.592988] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1952.593625] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1952.594219] ? io_submit_sqes+0x8610/0x8610 [ 1952.594745] ? recalibrate_cpu_khz+0x10/0x10 [ 1952.595277] ? ktime_get+0x158/0x1f0 [ 1952.595731] ? setup_APIC_eilvt+0x2f0/0x2f0 [ 1952.596255] ? clockevents_program_event+0x131/0x360 [ 1952.596873] ? tick_program_event+0xa8/0x140 [ 1952.597450] ? hrtimer_interrupt+0x771/0x9b0 [ 1952.597995] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1952.598633] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1952.599259] do_syscall_64+0x33/0x40 [ 1952.599711] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1952.600332] RIP: 0033:0x7fa2cf50cb19 [ 1952.600783] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1952.603041] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1952.603969] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 10:21:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x68000000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:21:54 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0x0, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:21:54 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x3f, 0x2, 0x7f, 0x2, 0x0, 0x5, 0x11010, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140)}, 0x385, 0x3ff, 0x10000, 0x4, 0x2, 0xfff, 0xa4a, 0x0, 0x92, 0x0, 0x1000}, 0x0, 0xe, r1, 0x9) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r6 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r6}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0)=0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) r8 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x5, 0x9, 0x0, 0x1, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x42, 0x81) r10 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r9, 0x10000000) r11 = io_uring_register$IORING_REGISTER_PERSONALITY(r8, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r10, &(0x7f0000000480)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000440)=0x80, &(0x7f0000000840)=@qipcrtr, 0x0, 0x0, 0x0, {0x0, r11}}, 0x81) syz_io_uring_submit(r7, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x1, 0x0, @fd, 0x8, 0x0, 0x5, 0x4, 0x1, {0x0, r11}}, 0x3) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r12 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) syz_io_uring_submit(r12, r4, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r2, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:21:54 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:21:54 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) r7 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x5, 0x9, 0x0, 0x1, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r9 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r8, 0x10000000) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r9, &(0x7f0000000480)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000440)=0x80, &(0x7f0000000840)=@qipcrtr, 0x0, 0x0, 0x0, {0x0, r10}}, 0x81) syz_io_uring_submit(r4, 0x0, &(0x7f0000000140)=@IORING_OP_WRITE={0x17, 0xf8c032c7564c1645, 0x7, @fd, 0x0, &(0x7f00000001c0)="c4ad59195fa6c797bf69619047da05aaced8d909d984fe14e8dc894be422e5633380a57421a0088696306159fe8c4d759c5c73fc0a71ae21b925b801a60b3163e9bf37aacb972c657cf8d4e9838c32de2db364f5d7515448f805221e30b5ca235c83109fbb41a5bb9a457467e398a1b5a8cdd97208aa8ccd117d76a3bca62057c6c40cad", 0x84, 0x1a, 0x0, {0x0, r10}}, 0x6) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:21:54 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0x0, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:21:54 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 34) 10:21:54 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0x0, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) [ 1952.604833] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1952.615530] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1952.616581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1952.617701] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:21:54 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r6, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) ftruncate(r4, 0x1) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:21:54 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 35) 10:21:54 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:21:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6c000000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:21:54 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0x0, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:21:54 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0x0, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) [ 1952.849967] FAULT_INJECTION: forcing a failure. [ 1952.849967] name failslab, interval 1, probability 0, space 0, times 0 [ 1952.851385] CPU: 0 PID: 10962 Comm: syz-executor.7 Not tainted 5.10.233 #1 10:21:54 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0x0, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) [ 1952.852219] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1952.853275] Call Trace: [ 1952.853624] dump_stack+0x107/0x167 [ 1952.854105] should_fail.cold+0x5/0xa [ 1952.854606] ? create_object.isra.0+0x3a/0xa20 [ 1952.855209] should_failslab+0x5/0x20 [ 1952.855706] kmem_cache_alloc+0x5b/0x310 [ 1952.865329] ? mark_held_locks+0x9e/0xe0 [ 1952.865861] create_object.isra.0+0x3a/0xa20 [ 1952.866428] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1952.867089] kmem_cache_alloc_bulk+0x168/0x320 [ 1952.867686] io_submit_sqes+0x6fe6/0x8610 [ 1952.868252] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1952.868910] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1952.869562] ? find_held_lock+0x2c/0x110 [ 1952.870100] ? io_submit_sqes+0x8610/0x8610 [ 1952.870674] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1952.871319] ? wait_for_completion_io+0x270/0x270 [ 1952.871951] ? rcu_read_lock_any_held+0x75/0xa0 [ 1952.872570] ? vfs_write+0x354/0xb10 [ 1952.873026] ? fput_many+0x2f/0x1a0 [ 1952.873528] ? ksys_write+0x1a9/0x260 [ 1952.874020] ? __ia32_sys_read+0xb0/0xb0 [ 1952.874568] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1952.875256] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1952.875953] do_syscall_64+0x33/0x40 [ 1952.876443] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1952.877140] RIP: 0033:0x7fa2cf50cb19 [ 1952.877598] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1952.879826] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1952.880749] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1952.881687] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1952.882626] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1952.883561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 10:21:54 executing program 5: clone3(0x0, 0xfffffffffffffde0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x36b5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xa, 0x4010, r5, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r6, 0x10000000) syz_io_uring_submit(0x0, r7, 0x0, 0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_setup(0x4, &(0x7f0000000080), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r9, r10, &(0x7f0000000100)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x6}, 0x0) syz_io_uring_submit(r9, r7, &(0x7f0000000140)=@IORING_OP_NOP={0x0, 0x4}, 0x7f) syz_io_uring_submit(r8, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) r11 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r11, 0x541d, 0x0) dup2(r0, r11) [ 1952.884498] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:21:54 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 36) 10:21:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x74000000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:21:54 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index=0xa, 0x9, 0x0, 0x6}, 0x4cbe) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:21:54 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x80, 0x41ee5544, 0x7d, 0x0, 0x0, 0x10000}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r4 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r4}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r5, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:21:54 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0x0, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:21:54 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0x0, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) [ 1953.076106] FAULT_INJECTION: forcing a failure. [ 1953.076106] name failslab, interval 1, probability 0, space 0, times 0 [ 1953.077789] CPU: 0 PID: 10983 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1953.078683] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1953.079758] Call Trace: [ 1953.080117] dump_stack+0x107/0x167 [ 1953.080597] should_fail.cold+0x5/0xa [ 1953.081122] ? create_object.isra.0+0x3a/0xa20 [ 1953.081729] should_failslab+0x5/0x20 [ 1953.082232] kmem_cache_alloc+0x5b/0x310 [ 1953.082767] ? mark_held_locks+0x9e/0xe0 [ 1953.083316] create_object.isra.0+0x3a/0xa20 [ 1953.083894] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1953.084569] kmem_cache_alloc_bulk+0x168/0x320 [ 1953.085215] io_submit_sqes+0x6fe6/0x8610 [ 1953.085779] ? __do_sys_io_uring_enter+0x6b2/0x1890 [ 1953.086440] __do_sys_io_uring_enter+0x6b2/0x1890 [ 1953.087069] ? find_held_lock+0x2c/0x110 [ 1953.087619] ? io_submit_sqes+0x8610/0x8610 [ 1953.088191] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1953.088837] ? wait_for_completion_io+0x270/0x270 [ 1953.089507] ? rcu_read_lock_any_held+0x75/0xa0 [ 1953.090116] ? vfs_write+0x354/0xb10 [ 1953.090609] ? fput_many+0x2f/0x1a0 [ 1953.091097] ? ksys_write+0x1a9/0x260 [ 1953.091595] ? __ia32_sys_read+0xb0/0xb0 [ 1953.092142] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1953.092832] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1953.093530] do_syscall_64+0x33/0x40 [ 1953.094029] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1953.094693] RIP: 0033:0x7fa2cf50cb19 [ 1953.095193] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1953.097602] RSP: 002b:00007fa2cca82188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1953.098598] RAX: ffffffffffffffda RBX: 00007fa2cf61ff60 RCX: 00007fa2cf50cb19 [ 1953.099535] RDX: 0000000000000000 RSI: 00000000008058ab RDI: 0000000000000004 [ 1953.100450] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1953.101392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1953.102308] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:22:07 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:22:07 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) (fail_nth: 37) 10:22:07 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0x0, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:22:07 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0x0, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:22:07 executing program 4: r0 = syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000440)='./file0\x00', 0x7, 0x4, &(0x7f00000008c0)=[{&(0x7f0000000640)="4f65987f68396ddda7ab526e64c5c90f11c43f4a28a94f8c03ff94d52bcc5bd04b3b", 0x22, 0x4}, {&(0x7f0000000680)="ec698b20ec47777e1ba25ec91924bf511f28e6d45f220392d8c89e5a9e37c04eed8037c573331751c2a7d958b3d05fb8077fefa239d847097ba52ce6ec3e395cff581dcdbae92a96d6d3752f79d6b35d1759be2d0c4e5b28ac11e1cc7621b71f3fc7297a118e0c44bafaa649dc1f8e4eb2d24b3865fa7b21e2297e6cf21f327e74f58afe9e8e938446752fbf25690af3b0918b9dbf", 0x95, 0xa095}, {&(0x7f0000000740)="8b19aeb5ccd2ddeb831910a6028d983dc9fde2b4dbf125d9094d28b17818989fb8dae763c9d8ad3bd5534686f30cfe9e9c0275c1f2192c9323d66ab9360d080fce9b8d51f558ab07a746c11877fadd86e98f3d9fdd8711ad52856a216210e132824795f95e5a4d03c9b9063e9da07783203acd58b092eb1cb02163646cb9ce6d3f509930716cfed22cfbffab4f6b6a8e9fd980ca73d2f67d09829b8a4843ba2a119f24890acf8f83b5883a6c43f5fb212373f1a67b30b102a09b311bdbfa397c3417777009cd4b9a7a57556ed735ae6c6a8a00", 0xd3, 0x200}, {&(0x7f0000000840)="d3e278fa05a30f732a8c05e3e8642dde30e869a256ac4013fc75d925dbc1ef6a4d08f2f9fddc2f5d1113bb0f268aeedfab58a66f7163787b8664814166e4fcd47fbf85df1aedb691ab06c97bfb076a16f3246ec3d01451a0dee8ae263fcbcd47070f5f6a63ac91bc219def4fe049bd7bd1b98b90f35e", 0x76, 0x40}], 0x2000, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7569643d1d08d472fcf76049718801003624008f53449291593b31952e659e210d9562ca448251ad9b63ab2dc4db3bf5b3fba41ead1bcea630374128760e56bb07ca0155e0284a32dde384d4c3174f588fab2258074470d90f5fee", @ANYRESHEX, @ANYBLOB=',block=0x0000000000000400,map=normal,check=relaxed,dont_appraise,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c7063723d30303030303030303030303030303030301628c57b736d61636b66736465663d2d2d2c736d614d6b66736465663d002c6d6561737572652c7569643c", @ANYRESDEC=0xee01, @ANYBLOB=',defcontext=unconfined_u,\x00']) pwritev2(r0, &(0x7f0000000b00)=[{&(0x7f0000000a40)="469482e4bbbd54ab45dad547babfe6caf0e5da1acace8479afe00a8ae88aae94ddedf2aecda5ff654a3f9a4c59a41aecd7920c5f246219b1f3a598849b", 0x3d}, {&(0x7f0000000a80)="74d6ce00d36d18ee8a47339b8079f445484c71968088154a1a1c694569fb7479fafd270caff950f1684101650952bb0a3bac6c3c6721075765016377e5369add8a0992a93c3b0c2dd9f40d0e37b16625", 0x50}], 0x2, 0x2, 0xffff, 0x13) clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r1, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x3eb5, &(0x7f0000000940)={0x0, 0x0, 0x0, 0xfffffffc}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r6 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r6}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x300000a, 0x30, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) r8 = socket$inet_icmp(0x2, 0x2, 0x1) fsetxattr$security_ima(r8, &(0x7f0000000b40), &(0x7f0000000b80)=@md5={0x1, "9f8d17aaa113e0257b48535510de6eea"}, 0x11, 0x1) syz_io_uring_submit(r7, r4, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000000) r9 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r9, 0x541d, 0x0) dup(r9) io_uring_enter(r2, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:22:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7a000000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:22:07 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syncfs(r3) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd, 0x9, 0x0, 0x5}, 0x80000001) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:22:07 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0x0, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) [ 1966.073330] FAULT_INJECTION: forcing a failure. [ 1966.073330] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1966.079166] CPU: 0 PID: 11009 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1966.080017] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1966.081028] Call Trace: [ 1966.081357] dump_stack+0x107/0x167 [ 1966.081823] should_fail.cold+0x5/0xa [ 1966.082295] _copy_to_user+0x2e/0x180 [ 1966.082770] simple_read_from_buffer+0xcc/0x160 [ 1966.083343] proc_fail_nth_read+0x198/0x230 [ 1966.083873] ? proc_sessionid_read+0x230/0x230 [ 1966.084435] ? security_file_permission+0xb1/0xe0 [ 1966.085032] ? proc_sessionid_read+0x230/0x230 [ 1966.085616] vfs_read+0x228/0x620 [ 1966.086047] ksys_read+0x12d/0x260 [ 1966.086483] ? vfs_write+0xb10/0xb10 [ 1966.086946] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1966.087591] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1966.088229] do_syscall_64+0x33/0x40 [ 1966.088684] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1966.089313] RIP: 0033:0x7fa2cf4bf69c [ 1966.093800] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1966.096017] RSP: 002b:00007fa2cca82170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 10:22:07 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 1966.096935] RAX: ffffffffffffffda RBX: 0000000000000412 RCX: 00007fa2cf4bf69c [ 1966.097818] RDX: 000000000000000f RSI: 00007fa2cca821e0 RDI: 0000000000000006 [ 1966.098677] RBP: 00007fa2cca821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1966.099536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1966.100394] R13: 00007fff5bb401af R14: 00007fa2cca82300 R15: 0000000000022000 10:22:07 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r4, 0x127d, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x300000e, 0x30, r4, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r5, 0x10000000) syz_io_uring_submit(0x0, r6, 0x0, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r7, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:22:07 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x0, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:22:07 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0x0, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:22:07 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:22:07 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x0, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:22:21 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x0, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:22:21 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) stat(&(0x7f0000000140)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r4) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cachetag={'cachetag', 0x3d, '\x00'}}, {@debug={'debug', 0x3d, 0x401}}, {@debug={'debug', 0x3d, 0x100000001}}], [{@dont_measure}, {@euid_gt}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@euid_eq={'euid', 0x3d, r4}}, {@obj_user={'obj_user', 0x3d, '\x00'}}]}}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r5, 0x10000000) syz_io_uring_submit(0x0, r6, 0x0, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r7, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:22:21 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x28, r0, 0x5, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc, 0x99, {0x0, 0x5}}}}}, 0x28}}, 0x0) sendmsg$NL80211_CMD_DEL_PMKSA(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x44, r0, 0x0, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0xc574, 0x33}}}}, [@NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0xf00}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4001}, 0x24040080) clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r1, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r7 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r7}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) pipe(&(0x7f0000000140)) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r9 = gettid() ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r8, 0xc0189375, &(0x7f0000000740)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000000640)={0x3, 0x80, 0x6, 0x8, 0x1f, 0xff, 0x0, 0x5, 0x40, 0xd, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xde83, 0x1, @perf_bp={&(0x7f0000000440), 0xe}, 0x8000, 0x50000, 0x8, 0x2, 0xffffffffffffffff, 0x100, 0x9, 0x0, 0x1}, r9, 0xd, r10, 0x9) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r11 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r3, 0x8000000) syz_io_uring_submit(r11, r5, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r3, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:22:21 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0x0, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:22:21 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:22:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8cffffff, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:22:21 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x0, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:22:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x0, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:22:21 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x0, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:22:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x97ffffff, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:22:21 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9def, 0x4, @perf_bp={&(0x7f0000000140)}, 0x2304, 0x3, 0x81}, r0, 0x1, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r6 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r7 = syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r6}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) dup2(0xffffffffffffffff, r1) syz_io_uring_submit(r8, r4, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r2, 0x8058ab, 0x0, 0x0, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x9010, r7, 0x8000000) 10:22:21 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x2000, 0x0, 0x0, 0x0) 10:22:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x0, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:22:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x0, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:22:34 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x4000, 0x0, 0x0, 0x0) 10:22:34 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x80, 0x8, 0x3, 0x42, 0x0, 0x8d, 0x10400, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_config_ext={0x6, 0x1}, 0x2, 0x10000, 0x309a, 0x2, 0x20, 0x20, 0x7, 0x0, 0xbad, 0x0, 0x8}, r0, 0x9, r1, 0xa) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_bp={&(0x7f00000006c0), 0x8}, 0x0, 0x3, 0x81, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7f) r6 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r7 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r7}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) syz_io_uring_setup(0x589e, &(0x7f0000000640)={0x0, 0x5f29, 0x0, 0x1, 0x34}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140), &(0x7f0000000440)) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r3, 0x8000000) syz_io_uring_submit(r8, r5, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r3, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:22:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x0, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:22:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:22:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xc0ed0000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:22:34 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r4, 0x127d, 0x0) sendmsg$nl_xfrm(r4, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)=@updsa={0xf8, 0x1a, 0x1, 0x70bd2d, 0x25dfdbfe, {{@in6=@mcast2, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4e20, 0x3, 0x4e22, 0xbd0d, 0x2, 0x90, 0x80, 0x88}, {@in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x4d3, 0xaf}, @in6=@remote, {0x10001, 0x6, 0x80000001, 0x8, 0xfffffffffffffffe, 0x2, 0x6, 0x80000000}, {0x40, 0x3, 0x10001, 0x4}, {0x2, 0x4, 0xfffffff7}, 0x70bd27, 0x34ff, 0xa, 0x3, 0x6, 0x2}, [@proto={0x5, 0x19, 0xff}]}, 0xf8}, 0x1, 0x0, 0x0, 0x1}, 0x40000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r5, 0x10000000) syz_io_uring_submit(0x0, r6, 0x0, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r7, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:22:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:22:34 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x400000, 0x0, 0x0, 0x0) 10:22:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x0, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:22:34 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_bp={&(0x7f0000000140), 0xc}, 0x0, 0x3, 0x81, 0x0, 0x0, 0x0, 0x1}, r0, 0xfe00000000000002, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r6, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:22:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:22:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xed86b2fe, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:22:34 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x800000, 0x0, 0x0, 0x0) 10:22:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x0, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:22:34 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x3, 0x1, 0x0, 0x0) 10:22:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:22:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0x0, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:22:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x0, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:22:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xf6ffffff, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:22:49 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) io_uring_enter(r1, 0x2ea9, 0xe728, 0x1, &(0x7f0000000140)={[0x1]}, 0x8) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000440)={@id={0x2, 0x0, @b}}) ioctl$LOOP_SET_STATUS(r6, 0x127d, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xc, 0x30, r6, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:22:49 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x1000000, 0x0, 0x0, 0x0) 10:22:49 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:22:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:22:49 executing program 5: clone3(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000300)=ANY=[@ANYBLOB="01000000090000001800000083e84725b7505223e1044dfea2b17347884f146f097bfed3568297decada60fff35470f74701e19fcccbc7720ddd97cdfd31104f008000000000000099e810b03d638a883a93d7cbdaeb5467c67cb840c0fe1b8b87b4def7a62e20eb7323ccd88312ba0322297492d4f80559f6fea6b0450177200403f408ddd31a201ac18cb7aa2cb032d0ef956e806518874f7d2d0f446e87dc55afdb6ca388adf9d6466b4f65484c3b158f723198000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x100000d, 0x10010, r5, 0x8000000) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r6, 0x10000000) syz_io_uring_submit(0x0, r7, 0x0, 0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r8, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:22:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:22:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:22:49 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080)={0x0, 0x60b, 0x10}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r4, 0x127d, 0x0) r5 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x5, 0x9, 0x0, 0x1, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r6, 0x10000000) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r7, &(0x7f0000000480)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000440)=0x80, &(0x7f0000000840)=@qipcrtr, 0x0, 0x0, 0x0, {0x0, r8}}, 0x81) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x1, {0x2, r8}}, 0x8e) r9 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0xf0aa, 0x0, 0x1, 0x1b2, 0x0, r9}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r10 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r10, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:22:49 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x20000000, 0x0, 0x0, 0x0) 10:22:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xf9fdffff, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:22:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0x0, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:22:49 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:22:49 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) r7 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x5, 0x9, 0x0, 0x1, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r9 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r8, 0x10000000) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r9, &(0x7f0000000480)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000440)=0x80, &(0x7f0000000840)=@qipcrtr, 0x0, 0x0, 0x0, {0x0, r10}}, 0x81) syz_io_uring_submit(0x0, r2, &(0x7f0000000140)=@IORING_OP_SEND={0x1a, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)="df087f42d02d352a943d709909a337e4915d0da5fbf53185f75b159f63b2a3244cd35d2b8e60c018426b9a8f50d588c199dfe634e3f89d4c885b7d8032b643680df0e1fbe2404c32461eb8e07419966cd5f1e46bf4214b5b9d407b8cb19170268c65d69ed12f6e9097fd89100d4e22621bbb84e093e8645dbf15676e95f00a8468f69c4cd595f33645f1b584d713da0aa8be8eb5a3cb3cb36f6b706b358668a3cd3b973e37bcbe2e8fd5bed72aa70f3669d9ebe039c84af6613818a352fd1b8f0bf70792366cabd821b82c3be9c3aec38aa0", 0xd2, 0x4, 0x1, {0x0, r10}}, 0x7) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:22:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfcfdffff, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:22:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:22:49 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x2000, 0x0, 0x0) 10:23:02 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:23:02 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x4000, 0x0, 0x0) 10:23:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfdfdffff, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:23:02 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0x0, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:23:02 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0)=0xffffffffffffffff, &(0x7f0000000200)=0x0, &(0x7f0000000280)=0x0, {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r1, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r8 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r8}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) r9 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv(r9, &(0x7f0000001400)=[{&(0x7f0000000d40)=""/244, 0x7ffff000}], 0x1, 0x0, 0x0) sendmsg$nl_generic(r9, &(0x7f0000002280)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000002240)={&(0x7f0000000640)={0x1bd4, 0x3f, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@nested={0x2eb, 0x45, 0x0, 0x1, [@generic="e22b9b3a07743cc8c684f960a42d211a39431d23547110d5f6222b32e092775c139e67cc769024870a1d310b99e3696145fe4830f1b161d7c53d9cec82f4ec98312306a6faf36853fd032c18faba3ccb0dd56c134587c6b7744ee4421c6a4625292cbb5f429dbe3c5ceed585bd83da521e3227b90f5fee4643580713dd0f6a5a66855687fe166969c8415a991d8fa296b03b43db2fc10a3d2a98bfb7fd4d11e6ab0ae8c9af99825d18688a55760e7ffdb1bf121e66ecfb1d274ad64d62e62c63c6993ab08aa580e88e", @typed={0x8c, 0x35, 0x0, 0x0, @binary="8a546200d456c9ea509a1a51fcaaa79ff7428a935c5f3e00574b49d2d7839c446db29c63925a5789bfa5bc686b291c753251d1addd813d48524cd5276ef3f7389168ab84fa043784f831864a8aa82c0c0461039e6825c4fafa2b9216faa601088d37859fd008fe6e7ea7bccf1f138f659db251dffb0a01826716c42d2b2f5421227e904efb6ecd40"}, @generic="739e740b189d8c5528439878b0593ad105b6b24d9d59b536109f7b2c0a824e61bf77be7c3c0cde58458096166c81e7a5d995b3cf3072182fd6d3faf3704c51ef304c48e0babd3742d5e0f6afaa1928cc001b9cec483f3a0b69f5c320e4ec95eacb498f271076dcc171ee0d4d2f8ec1a4e2e0778b98b1e10f368bc1b6508359d4caf5867e85c89d273cb84ab03234e09b2e5069941d3881dabad21deb0fbcff0d19125bc31cea6f344c90e060a5bea68c802d1fcc27b318afdab3778cc1b2884c6cf536e65d68a2778f0dce960a471126a8a1fe00a99316b0e8f776667608905606", @generic="add7e7258fc72520bedb4dea51e2e97e67c54bea99df9c86418d1056ca8e2996ba59147f682de57b8b08df4efe97f3e51ced94ae805a242aef0d6cd839d22c43722464d2681b395e956cc84caaf0696fde14d11bf432028b0305b20aab8090a63884701c5cefcdb42f3b59275c4492cfa67131852618fd61f5cf4254885f5d3aaa859c29e1efb346fb370bc8118558ef1557ba34c884cc1cb88af447fb6ade8ef4", @typed={0x8, 0x94, 0x0, 0x0, @pid=r2}, @typed={0x8, 0x7, 0x0, 0x0, @fd=r0}]}, @generic="b90b99f2c68d09843fc731b7c44d0f412184", @nested={0xc, 0x18, 0x0, 0x1, [@typed={0x8, 0x1f, 0x0, 0x0, @fd=r4}]}, @nested={0x2b, 0x5, 0x0, 0x1, [@typed={0x8, 0x72, 0x0, 0x0, @ipv4=@multicast1}, @typed={0x14, 0x1d, 0x0, 0x0, @ipv6=@private1={0xfc, 0x1, '\x00', 0x56}}, @generic="5a03f9f784841259a87b86"]}, @nested={0x238, 0x37, 0x0, 0x1, [@typed={0x8, 0x8, 0x0, 0x0, @fd=r7}, @generic="2e35062bcefe20f534f33d5daa59bc5b3b1dcdc6d04faa6d32c759c9be90adba2fa1480a3aadfa935fbbacc95c1cbdc94999cb3fd00195fbf3b0ffb55f9a399d9f2fcedcaf390f010d314ff664c41a9daad764e26085df05c005c816dea360b1eae5df0620e448415286bbe028302d1901f73a07ae5f8abd9bfb83a818e722554eae671f3fbc50762e1f78ad46b46a2ea13f710a5b75cf618459fb24ac90da1dc7a221092f3502c116e0ad27cf2b527d385ba53ff63769f974", @generic="8faf12a12fb685967f505b6e43f4213caa78ed2436fbedfdc542553dbd2ced59d3f769b3d73c59ad5904a28a9a35fb501fe1fcbed040ba085468b689ca68bc29670781d17ba0d13a9bc50a809ac3b7b33be38a55c985ff955564b87a09b45b6a4325e5c53b8a1b64b9b66c9801e147b4ede980ba2708db1a367e1f1ff73223c802bbb22a919643bca93fdfa9cd0fa531b7ea9e3e4fa9db4f6c567293712a8e3ec319f356f6d133a974302b5137462ce1133f9830f43f6d3f645a8ecede7b67aa936e2b6525c908bf609e75e178cfc407", @generic="ad4a96a9d1fecdb152ef51884957970d52623657162fa3fe9254ba41efd94453f4fdb3261909314c7d120145be70fb975fecf67addb93df5a30b2e8019c3553d1b266f7eb74e449e6bb065791f5654c058cb4ad0e5465e2886fc288dcd01bdde70a69002fa92e299a87ef0e63b93e01a4b4afddb2e55636df6bc0a160b964a90abd6e400556e57f14fc723f6a3dfad9139d6d1155b8d2a7f6dd856b9bdc9af", @typed={0x4, 0x82}]}, @typed={0x8, 0x3f, 0x0, 0x0, @u32=0x8}, @nested={0x11ab, 0x7d, 0x0, 0x1, [@generic="7fa3cd7356d5a94d8d4ba786ae87389880742f73c49803f81f9d5e18910fea72c0fac8d23d49a8ed5eeeee898a44c4c6513875fff009d8c1f69a6991778423a2add23edd1973580b0ecebf843f47ed0d7134b829c719b89c0fa8bf971dd01f923af53edadcb946fd52739f03cde16dee9e14985626fe293d43fb", @generic="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", @typed={0xc, 0x72, 0x0, 0x0, @u64=0x3}, @generic="51bbd828614aa2c958bf0e1071c5dd3732e912cb852ee55bbb875f7e54b346c982339083879458c993f7a5f32cf31f1e85f3fa1b0f3e2459bbd283c9ff47992a23558a09fb91134180caedc6a081c498b237a70f10f8831e51ece23b01bf3a7a10671bf69dea7313a1e7419e2e85b5cc437120256ec84370360f8148139d2ecd1ff7123fbf3d8c4fa794ee4be7413936c0fea8b542df53", @generic="1414b3ccb0c8746dfececc3ef895b1d4122403c077abc5c8bd95ac7a8887e90e5489db2e2097ede5801249e432b9d14bb603b9470a41eaac79a8b33c20a97abeed590518052a751396f5def1f0377002a0220222a8ec4db9ba95d9acf8102d84f88e9c45d53b4444ddf8ed46a0206018a2d9f4ea92076bccd97a068d0968a35fb956255a34085e26a7af"]}, @nested={0x1a9, 0x43, 0x0, 0x1, [@typed={0x8, 0x6e, 0x0, 0x0, @fd=r3}, @generic="4a6d188c38b8b4fdef0f817b112c9a61bc04a6fa5ff03b0ef90ea1d452a45b5b32863f32c5acbdb5ee5eda5cfcc77bbba030178c581f60d4d7765eae9e63a780714a9d03039465ae9f6970b3324ab45029f9e5df5d6d654e260f714d68ef011a0d7ab399ead8cd8536815d80686ef6081fa5659a489d5a92d02045ea063a8205dc150c948c45da918e004369fa8342a1d9e13926eaf2f1fcfc341ff03c314ff70808f46acd2304de89797d6c", @typed={0x8, 0x92, 0x0, 0x0, @u32=0xfffffffd}, @generic="6928ebf5713be142b01f0ec41ecf4c7999a971a39b58ad02d84937f00a21618fe7f4ae240875326917154f477ff5d809696e23e3f6653c31032a52e566f8b117ad8fe15c705bf4dc09af96addbe1518855d5311a706979999440cb59a372773c2a14c3b50bd0b618452cf7b39fd7d340b7ee0d9eb01960047e70926ae0845cd4853428bc7f851380f25d6959caada2ccd92c1d21cd02dbffd9c3befabc2edbc792a9c3d3a6feee2ae6d846195c78e784395e6795d5eb9708ff47e878760558691bc08da63876220f5f149265107502c67613258ddca0e3085fadf855a8b9c1cef081762871d2332b33"]}, @nested={0x2ed, 0x4, 0x0, 0x1, [@generic="3adeeaeed4bde76b0fbade6c6eae3b5aedfac4b1715236407e4d6a02d99e058fd667b37f326af428a654a0b743c2f5b098be5e823962b29b7e0d8e37948c29e53c5de7c940da71c306f988e51d50e30d7a40a5aa28db14daea0da1c9184df373a5c928f2a9b5eed3f464540ca1ff0da4d4aa0081a4ce737d0b302aea", @generic="9f63d4340aca83726f20ec4f750daebafcee25ae3bd592688ef5cf1edc325caa7abc255aed3af2b855da81ffcb0f5a3ed026568f98cb39a422c4e10ce83887ac99beb7d41a0a78912c4293a18667d9a3e440", @generic="9a334de6c6994bfa85bec330c9b8f6741113162822424f8371cf612a9f5c0aeac7d660d395d7205a3aa50a9bb7a79a1e1dd9067de14c062636037e4fea31e70a9439583009694dae8db399429470ffa1c67de7c38559dff8021d07001219098d616c90df1a98519dec62b332e1e8b6668a2dcc80be82eb17b012f83a92339cf3db99c429e0fabc7158baa93157a32a0ed213d18515cc5052e926111143f243c19c1a58892ba1662d55d8f017c63639e77552f27cf33d9a420070ead1953bdd9e79ee6669d55d1e529f609320f4a03d5ccab7eed9e9eaac278cc809865c0daeafc26b0d29bf541b930bdab4e2429e93baac8eeeaff37afa5114", @generic="7091f88c0918174246a29720f7fa4384699dc7472dc3f0cc6bda193e57ef178dde6c85d0a12e35e42bfe41284630c91d587b239d948baa06d18302063281bf66149f2cd37d846fdb697955", @generic="7cf555439b02cb22e090a72c79acc31f19aab8973675b5eb0bc46469613ea6", @generic="b9d3e8f90ed79402b14ec38559202a59b2f28adcd31d364b02ae379216978f33187d2171b1c304d3e3bf662a209314972b1c549b60095450d380ce2af1eeb6e879f772762b9142ffdecb59aaf04b8988d624b8734a28ee708981752fce2956272f7c041e78eab16c625d423ba3826d0e61994b6537df91d9e78bb4c4747f3caf4f84005764b13f028d1460bc93197f888c431f3888200cfae01e651af566cf9e20a59cc20f7c87382f9518a5ceb1f632", @typed={0x8, 0x16, 0x0, 0x0, @ipv4=@loopback}]}]}, 0x1bd4}, 0x1, 0x0, 0x0, 0x40000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4, &(0x7f0000000080), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r10, r11, &(0x7f0000000100)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x6}, 0x0) syz_io_uring_submit(r10, r6, &(0x7f0000000140)=@IORING_OP_WRITE_FIXED={0x5, 0x3, 0x0, @fd_index=0x7, 0x3, 0x7f, 0x2}, 0xfffffffe) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r12 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r4, 0x8000000) syz_io_uring_submit(r12, r6, &(0x7f0000000440)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0xf68) io_uring_enter(r4, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:23:02 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:23:02 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = open(&(0x7f0000000140)='./file0\x00', 0x12800, 0x4) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000000, 0x30, r3, 0x8000000) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r5, 0x10000000) syz_io_uring_submit(0x0, r6, 0x0, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r7, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:23:02 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:23:02 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x400000, 0x0, 0x0) 10:23:02 executing program 5: clone3(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x85, 0x5}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080)={0x0, 0x5241}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000200)={0x0, 0x80, 0x1, 0x6, 0x0, 0x1, 0x0, 0x3b529694, 0x4710, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x81, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x40041, 0x0, 0x5, 0x8, 0x8, 0x1ff, 0x7221, 0x0, 0x7, 0x0, 0x7fffffff}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r5, 0x10000000) syz_io_uring_submit(0x0, r6, 0x0, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:23:02 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0x0, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:23:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfdffffff, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:23:02 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:23:14 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x800000, 0x0, 0x0) 10:23:14 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:23:14 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r6, 0x541d, 0x0) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r7, 0x541d, 0x0) ioctl$BTRFS_IOC_ADD_DEV(r6, 0x5000940a, &(0x7f0000000640)={{r7}, "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"}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r8, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:23:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfeb286ed, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:23:14 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0x0, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:23:14 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:23:14 executing program 5: r0 = clone3(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x4}, 0x50014, 0x3, 0x85, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x40010022, 0x1}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x517fe0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r7 = accept4(r5, &(0x7f00000001c0)=@caif=@dbg, &(0x7f0000000140)=0x80, 0x80000) r8 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv(r8, &(0x7f0000001400)=[{&(0x7f0000000d40)=""/244, 0x7ffff000}], 0x1, 0x0, 0x0) r9 = accept(r5, &(0x7f00000006c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000740)=0x80) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r1, &(0x7f0000000780)={r8, r9, 0x7}) pread64(r7, &(0x7f0000000300)=""/217, 0xd9, 0x1) r10 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r6, 0x10000000) syz_io_uring_submit(0x0, r10, 0x0, 0x0) r11 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) syz_io_uring_submit(r11, r4, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r2, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:23:14 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:23:14 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x1000000, 0x0, 0x0) 10:23:14 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b1, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000140), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r6, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) syz_io_uring_setup(0x1a7c, &(0x7f0000000640)={0x0, 0x37b6, 0x10, 0x2, 0x378}, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000440)) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:23:14 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:23:14 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0x0, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:23:14 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:23:14 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:23:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffdf9, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:23:14 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x80000000, 0x0, 0x0, 0x0, 0x1}, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r6, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:23:27 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x20000000, 0x0, 0x0) 10:23:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffdfc, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:23:27 executing program 5: clone3(0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x541d, 0x0) dup2(r0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000000d40)=""/244, 0x7ffff000}], 0x1, 0x0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x1, 0x43, 0x80, 0x0, 0x0, 0xfffffffe}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000040)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r6, 0x10000000) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000001440)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="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"], 0x13d8}, 0x1, 0x0, 0x0, 0x4000}, 0x840) syz_io_uring_submit(0x0, r7, 0x0, 0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) syz_io_uring_submit(r8, r4, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r2, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:23:27 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x0, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:23:27 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:23:27 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:23:27 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:23:27 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000640), 0x6e, &(0x7f0000000880)=[{&(0x7f0000000440)=""/42, 0x2a}, {&(0x7f00000006c0)=""/6, 0x6}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000a00)=""/69, 0x45}, {&(0x7f0000000800)=""/44, 0x2c}, {&(0x7f0000000840)=""/43, 0x2b}], 0x6, &(0x7f0000000780)=ANY=[@ANYBLOB, @ANYBLOB="710814d07da8af2d97d8543b55beb970ef8753e98b2a775d8a28e16f956405561566", @ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32], 0x58}, 0x10100) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f00000009c0)=0x1, 0x4) r6 = openat$hpet(0xffffffffffffff9c, 0x0, 0x2a8400, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x6b24, 0x0, 0x0, 0x1af, 0x0, r6}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(r6, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:23:27 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x7ffffffff000, 0x0, 0x0) 10:23:27 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:23:27 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f0000000840)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180), &(0x7f0000000040)=0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000000)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x0, 0x0, @fd=r1, 0xfffffffffffffffd, 0x0, 0x7fffffff, 0x5}, 0x0) openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x10000, 0x2, 0x3, 0x28b}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000440), 0x0) r4 = syz_mount_image$nfs(&(0x7f0000000100), &(0x7f0000000640)='./file0\x00', 0x27c, 0x0, &(0x7f0000000a00), 0x108820, &(0x7f0000000680)=ANY=[@ANYBLOB="53dded0e7b492cb29a1bd8575b5ad1b0e131be5b4bfab9fc375787a32cce73e010b012be9407762f21c73efac465c59d0fef951382af0e96ce117fc6d6a691a20275470faaccaca5bda9ee4e5685462361876b8732c7e0b2c68ec8cf58f45dbfeb4067f8018cbc25b8f0ce4fd4470a023516291f473d7da0662aea805a4f2c657569643d", @ANYRESDEC=0xee01, @ANYBLOB=',mask=^MAY_EXEC,permit_directio,uid=', @ANYRESDEC=0xee01, @ANYBLOB="1af4f8ce27c704ae13070ed7a8d2dfb19a72c09931d672afa1389db92c3deb60078fe737ae8033254ff22f8e7105b0f9f348688693a1269008dbaeacf181a117970fe8ad6434d32fe17fa36d428135372c3ee9c560c62b126eeadb8ab318806dec5802dac917680249fb3ef4daca3284efe310fdff27a8c1250661730c7ae7a50b698d1e4b55cb4ff9aa3948b021bb4517d0a99e959d26cb19693f899e6c04d365d37bd39311655e088f83d28b603dddf93b351004918c60a9109b6832e6376813011c3f97e9a78386dc7bfaa5552f59c8b4ae7b7068823d1d19610e185c"]) openat(r4, &(0x7f0000000b00)='./file0\x00', 0x6300, 0x2) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$dupfd(r5, 0x406, r1) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r6, 0x541d, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r6, 0x4008941a, &(0x7f0000000140)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r2, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:23:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffdfd, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:23:27 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x0, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:23:27 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:23:27 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = open(&(0x7f0000000140)='./file1\x00', 0xa8b01, 0x132) ioctl$VFAT_IOCTL_READDIR_BOTH(r6, 0x82307201, &(0x7f0000000500)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r7, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:23:40 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x40000000000000, 0x0, 0x0) 10:23:40 executing program 5: clone3(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file1\x00'}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r1, 0x541d, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1, {0xa69}}, './file0\x00'}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r6, 0x10000000) syz_io_uring_submit(0x0, r7, 0x0, 0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) syz_io_uring_submit(r8, r4, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r2, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:23:40 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x0, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:23:40 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r6, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:23:40 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:23:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xffffff7f, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:23:40 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:23:40 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:23:40 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r5, 0x89f8, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000640)={'ip6_vti0\x00', r6, 0x2f, 0x4, 0x8, 0x1, 0x20, @local, @ipv4={'\x00', '\xff\xff', @local}, 0x10, 0x7800, 0x2, 0x1}}) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r8, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r7, &(0x7f00000006c0), 0x2, 0x0) 10:23:40 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x80000000000000, 0x0, 0x0) 10:23:40 executing program 5: clone3(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140), 0x1, 0x32080) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file1/file0\x00'}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0xbeb5, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x0, 0x4000a8}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x300000e, 0x13, r1, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r5, 0x10000000) syz_io_uring_submit(0x0, r6, 0x0, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:23:40 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:23:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xffffff8c, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:23:40 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:23:40 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:23:40 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:23:40 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:23:40 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0)=0xffffffffffffffff, &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) r2 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = syz_open_dev$char_usb(0xc, 0xb4, 0x6) fcntl$dupfd(r2, 0x0, r3) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81, 0x1}, r1, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r8 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x572f, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0x1b2, 0x0, r8}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000640), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) r9 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r0, 0xf50f, 0x0) r10 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r4, 0x8000000) syz_io_uring_submit(r9, r6, &(0x7f0000000440)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x5, 0x2007, @fd=r4, 0x1f, 0x0, 0x0, 0x18}, 0x9) syz_io_uring_submit(r10, r6, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r4, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:23:40 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)=':\x00', 0x2}], 0x1}, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0xb, 0x0, &(0x7f0000000340)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r5, 0x10000000) syz_io_uring_submit(0x0, r6, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x3, 0x5, &(0x7f0000000400)=[{&(0x7f0000000200)="c2bcb4baeebb8ee005dede043e62ad7f598672e8342e4dee93f84e55006f993112e55aebde50285572b6cc9d3f4e44cef9a7e0859cd264adb9893f58dadc6586e3", 0x41, 0x4}, {&(0x7f0000000280)="3740e7daeb23aa317c2ad01a3f78", 0xe, 0xe39}, {&(0x7f0000000640)="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", 0xff, 0x898}, {&(0x7f0000000340)="2c2bc12d1a8ac405b981a19516c601d84bb60f9b3544231d3501d7a5a3884a85805835f3092981f727fa8955465842c4", 0x30, 0x3fffffffc0000000}, {&(0x7f0000000380)="1e36056789ab609fd7e4c3e5052e6e3f541d8c2f818d1701c0c4d73a76c3710068cd872a20d985579891844cfe3b8744b0a9b1755979aca4b401d98f2d3988350ccbd13fcc8cf5a81019572bea2a95e3cd44fa9df320e116c245e89e970cc93c283c1f8f1dea5d1b6170a39a11747f2ce3833f9cb24ebe7f14cf", 0x7a, 0x5}], 0x40000, &(0x7f0000000500)={[{@nonumtail}, {@shortname_winnt}, {@utf8no}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x101}}, {@nonumtail}, {@shortname_mixed}, {@fat=@fmask={'fmask', 0x3d, 0x3f}}], [{@context={'context', 0x3d, 'system_u'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@permit_directio}, {@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@appraise}, {@smackfstransmute}]}) 10:23:53 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000140)={0x1, 'veth1_virt_wifi\x00', {}, 0xfec0}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:23:53 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0xf0ffffff7f0000, 0x0, 0x0) 10:23:53 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001940)=0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0)=0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000001980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, r0, r1, r0, 0x0], 0xb}, 0x58) r3 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000019c0)=ANY=[@ANYBLOB="0100001a010000091800000074702e14765319c10d5e64a724dbc3807527e95870cdc205fb59f78ac357332f96585f9dd18e0cf6d8229c4b10d2cf19d99c2c89dcbd92ac329e111e81691c572b37a276294054ebb7d9553c6eced1d1b73be9a5d7a1bcf2f0b30d1488fe803ba2ca2b282165cafb34f42be3706ee9300c8497a132945d7a29a7d196885fd4ce5ade2455d1ab7724d22f06288b940a5e6680f52207d45eb1b54aa75abdface8bd5d0635760f183bd0a567b463f7d", @ANYRES32=r2, @ANYBLOB="6909b721df0c2f66696c653000"]) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3, 0x1010, r6, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x40000022}, 0x0) openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r7, 0x0, 0x483, &(0x7f0000000440)={0x50, @rand_addr=0x64010100, 0x4e24, 0x3, 'none\x00', 0x26, 0x2, 0x23}, 0x2c) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r3, 0x8000000) syz_io_uring_submit(r8, r5, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) r9 = inotify_init() readv(r9, &(0x7f00000018c0)=[{&(0x7f0000000640)=""/255, 0xff}, {&(0x7f0000000740)=""/161, 0xa1}, {&(0x7f0000000480)=""/92, 0x5c}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/20, 0x14}, {&(0x7f0000001840)=""/67, 0x43}], 0x6) io_uring_enter(r3, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:23:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:23:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xffffff97, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:23:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:23:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:23:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:23:53 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x100000000000000, 0x0, 0x0) 10:23:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:23:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffff6, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:23:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:24:06 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:24:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffd, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:24:06 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000640)={0x0, 0x66a}) r3 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r7 = openat$hpet(0xffffffffffffff9c, 0x0, 0x101000, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1b2, 0x0, r7}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r6, 0xd0009412, &(0x7f0000001640)={0x0, 0xd1}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r3, 0x8000000) syz_io_uring_submit(r8, r5, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r3, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:24:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:24:06 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x2000000000000000, 0x0, 0x0) 10:24:06 executing program 5: clone3(0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080)={0x0, 0x7f60, 0x0, 0x1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x5, 0x9, 0x0, 0x1, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r4, 0x10000000) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_FALLOCATE={0x11, 0xfb2a778a2d85fecd, 0x0, @fd_index=0x1, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x3f) syz_io_uring_submit(0x0, r5, &(0x7f0000000480)=@IORING_OP_OPENAT2={0x1c, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000240)={0x4000, 0x145, 0x15}, &(0x7f0000000280)='./file1\x00', 0x18, 0x0, 0x12345}, 0x81) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x5, 0x0, 0x401, 0x1, &(0x7f0000000140)="d5c21544b501121cbef1badad3f60802faa73a9da93d2d97afad11d60b0332024f7cd82152f7107553300a7f68b375367b9bf5b280df30", 0x400, 0x0, 0x0, {0x0, r6}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x100000e, 0x13, r0, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x40010, r7, 0x10000000) syz_io_uring_submit(0x0, r8, 0x0, 0x0) r9 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r9, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:24:06 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:24:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:24:06 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:24:06 executing program 7: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3eb5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x40000022}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x3, 0x8, 0xa2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x6}, 0x40000, 0x80, 0x10001, 0x6, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5, 0x0, 0x0, {0x0, r5}}, 0x80000001) io_uring_enter(r0, 0x8058ab, 0x0, 0x0, 0x0, 0x2000) 10:24:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x80000000000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) 10:24:06 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:24:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:24:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:24:06 executing program 4: clone3(&(0x7f00000005c0)={0x200001000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280), {0x25}, &(0x7f00000003c0)=""/69, 0x45, &(0x7f0000000500)=""/164, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dee, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0x3, 0x81}, r0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x355e, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x40000022}, 0x0) r5 = openat$hpet(0xffffffffffffff9c, 0x0, 0x321300, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000340)={0x0, 0x0, 0x10, 0x0, 0x1b2, 0x0, r5}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000140)=@IORING_OP_POLL_ADD={0x6, 0x5, 0x0, @fd_index, 0x0, 0x0, 0x0, {0x200}, 0x1}, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv(r6, &(0x7f0000001400)=[{&(0x7f0000000d40)=""/244, 0x7ffff000}], 0x1, 0x0, 0x0) openat(r6, &(0x7f0000000440)='./file0\x00', 0x282, 0xc0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r7, r3, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x2, 0x9, 0x0, 0x5}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) 10:24:06 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="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", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) 10:24:06 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80040881}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=ANY=[@ANYBLOB="4400000066c2638d56ab2fe594b434a4f42cb74d8b0f70a5b2844734448ebc98b599e376e6a65433faccc447562037668eb7d2cfc1a5dec277c38deb492459241f25ea844687affd", @ANYRES16=0x0, @ANYBLOB="000125bd7000fbdbdf25da804eeac3c65a8ba643e3f970a30082180000", @ANYRES32, @ANYBLOB="14756e6c430a00"/27], 0x44}, 0x1, 0x0, 0x0, 0x24000011}, 0x4840) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:24:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ca, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x1}, {&(0x7f0000000200)="3636861cf5a3f45c69ec5bd0b90945fcb814e4c1477c36d3bf29893a9f8f5123d6164ebfba3794b46b64acd88e2c16604cbadf59f98e9de085e5f937c84fc5c9125f7f221947a5b0d7993a29239ee78e8e69024e0f154cbdace6a04e166199f435d97fa9e4c73113636933418958ed85acd42ad2d9b31437b46f763897db3b8d7a62c265df0a344cf4d0eba1c1131cb20bc86552b5427d1761dd8c21b659604020cd062dac0dfcf4", 0xa8, 0x401}, {&(0x7f0000000740)="c2068ac14910e388e7b01981a4e4906ce59c062dd54351d779c5964e0546b98e3f9e83154feddf72c185ca427557903c9f90dfd90fd7bd9de235b9e358ba464d21f4579c207e8f2fd324abbd6ba8f4993f3020b546782f91a0d66eaf2be428cef8a94ff7ae82ee31b561a3ca5e6c6ea3443f850a196e6dff6c74d9ae37185f5ed273570f478b7de72462b901ded8d563d7349cf2126cff826bbf4fdb92877c370c5626ea006d3d0b43c972a28fb5251c2b01006a74551b30f1e273080695593400227b4f542c720f5de8101a0d68f05e29f97972f78514ece12e7bdaf9511c0e7f196d8fb43598a2a53cd425382a11c956b5ae66b958290aa99e92", 0xfb, 0x81}], 0x8000, &(0x7f0000000380)={[{@shortname_winnt}, {@uni_xlateno}, {@nonumtail}], [{@obj_type={'obj_type', 0x3d, '(%'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, '\x00'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xd}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x81, 0x0, 0xff, 0xd9, 0x0, 0x7c8d, 0xa4002, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000480)}, 0x30d7, 0x4, 0x1000000, 0x7, 0x4, 0x5, 0x8001, 0x0, 0xffffff43, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x1) 10:24:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xedc000000000, 0x0, &(0x7f00000002c0), 0x8000, &(0x7f0000000380)={[], [{@obj_type={'obj_type', 0x3d, '(%'}}]}) [ 2097.771506] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2097.772962] CPU: 0 PID: 259 Comm: syz-fuzzer Not tainted 5.10.233 #1 [ 2097.773738] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2097.774763] Call Trace: [ 2097.775089] dump_stack+0x107/0x167 [ 2097.775535] dump_header+0x106/0x655 [ 2097.775989] oom_kill_process.cold+0x10/0x15 [ 2097.776526] out_of_memory+0x1149/0x1440 [ 2097.777025] ? oom_killer_disable+0x280/0x280 [ 2097.777572] ? mutex_trylock+0x237/0x2b0 [ 2097.778074] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 2097.778802] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 2097.779520] ? lock_acquire+0x167/0x470 [ 2097.780005] ? warn_alloc+0x190/0x190 [ 2097.780481] __alloc_pages_nodemask+0x51d/0x600 [ 2097.781048] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2097.781778] ? find_get_entry+0x2c8/0x740 [ 2097.782301] alloc_pages_current+0x187/0x280 [ 2097.782836] __page_cache_alloc+0x2d2/0x360 [ 2097.783363] pagecache_get_page+0x2c7/0xc80 [ 2097.783891] filemap_fault+0x177d/0x2210 [ 2097.784390] ? read_cache_page_gfp+0x30/0x30 [ 2097.784926] ? replace_page_cache_page+0x1200/0x1200 [ 2097.785541] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2097.786197] ext4_filemap_fault+0x87/0xc0 [ 2097.786699] __do_fault+0x113/0x410 [ 2097.787144] handle_mm_fault+0x1e53/0x3500 [ 2097.787660] ? find_held_lock+0x2c/0x110 [ 2097.788154] ? __pmd_alloc+0x5e0/0x5e0 [ 2097.788631] ? vmacache_find+0x55/0x2a0 [ 2097.789121] do_user_addr_fault+0x56e/0xc60 [ 2097.789649] exc_page_fault+0xa2/0x1a0 [ 2097.790135] ? asm_exc_page_fault+0x8/0x30 [ 2097.790650] asm_exc_page_fault+0x1e/0x30 [ 2097.791149] RIP: 0033:0x4521da [ 2097.791541] Code: Unable to access opcode bytes at RIP 0x4521b0. [ 2097.792271] RSP: 002b:000000c0003678a0 EFLAGS: 00010216 [ 2097.792918] RAX: 0000000001240aa0 RBX: 0000000000ebe290 RCX: 0000000001240aa0 [ 2097.793781] RDX: 000000000000000c RSI: 0000000000465c30 RDI: 000000c000367ac0 [ 2097.794658] RBP: 000000c0003678b0 R08: 000000c0002f0060 R09: 000000c0002f0060 [ 2097.795520] R10: 0000000000000000 R11: 0000000000000000 R12: 000000c0093bbb00 [ 2097.796383] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 2097.797320] Mem-Info: [ 2097.797635] active_anon:8844 inactive_anon:57082 isolated_anon:0 [ 2097.797635] active_file:16 inactive_file:0 isolated_file:0 [ 2097.797635] unevictable:0 dirty:0 writeback:0 [ 2097.797635] slab_reclaimable:8250 slab_unreclaimable:263106 [ 2097.797635] mapped:69639 shmem:112 pagetables:928 bounce:0 [ 2097.797635] free:2860 free_pcp:117 free_cma:0 [ 2097.801427] Node 0 active_anon:35376kB inactive_anon:228328kB active_file:64kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278556kB dirty:0kB writeback:0kB shmem:448kB writeback_tmp:0kB kernel_stack:3552kB all_unreclaimable? yes [ 2097.804237] Node 0 DMA free:6504kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2097.807402] lowmem_reserve[]: 0 1616 1616 1616 [ 2097.808002] Node 0 DMA32 free:4936kB min:5116kB low:6768kB high:8420kB reserved_highatomic:0KB active_anon:35376kB inactive_anon:228328kB active_file:36kB inactive_file:0kB unevictable:0kB writepending:0kB present:2080640kB managed:1660456kB mlocked:0kB pagetables:3712kB bounce:0kB free_pcp:468kB local_pcp:240kB free_cma:0kB [ 2097.812073] lowmem_reserve[]: 0 0 0 0 [ 2097.812562] Node 0 DMA: 0*4kB 1*8kB (U) 0*16kB 1*32kB (U) 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6504kB [ 2097.814367] Node 0 DMA32: 544*4kB (UME) 55*8kB (UM) 23*16kB (M) 19*32kB (UM) 14*64kB (M) 2*128kB (M) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4744kB [ 2097.816134] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2097.817163] 136 total pagecache pages [ 2097.817619] 0 pages in swap cache [ 2097.818053] Swap cache stats: add 0, delete 0, find 0/0 [ 2097.818732] Free swap = 0kB [ 2097.819096] Total swap = 0kB [ 2097.819460] 524158 pages RAM [ 2097.819840] 0 pages HighMem/MovableOnly [ 2097.820315] 105067 pages reserved [ 2097.820785] Unreclaimable slab info: [ 2097.821407] Name Used Total [ 2097.822139] pid_3 7KB 7KB [ 2097.822806] pid_2 63KB 63KB [ 2097.823449] IEEE-802.15.4-MAC 31KB 31KB [ 2097.824110] p9_req_t 4KB 4KB [ 2097.824772] fib6_nodes 28KB 28KB [ 2097.825415] ip6_dst_cache 41KB 41KB [ 2097.826098] RAWv6 189KB 189KB [ 2097.826772] UDPLITEv6 62KB 62KB [ 2097.827411] UDPv6 62KB 62KB [ 2097.828069] TCPv6 62KB 62KB [ 2097.828729] scsi_sense_cache 4KB 4KB [ 2097.829368] sd_ext_cdb 3KB 3KB [ 2097.830024] virtio_scsi_cmd 16KB 16KB [ 2097.830707] sgpool-128 59KB 59KB [ 2097.831366] sgpool-64 63KB 63KB [ 2097.832022] sgpool-32 63KB 63KB [ 2097.832662] sgpool-16 15KB 15KB [ 2097.833319] sgpool-8 56KB 56KB [ 2097.833975] io_kiocb 705KB 705KB [ 2097.834652] mqueue_inode_cache 62KB 62KB [ 2097.835325] nfs_commit_data 15KB 15KB [ 2097.835996] nfs_write_data 47KB 47KB [ 2097.836638] jbd2_inode 11KB 11KB [ 2097.837296] ext4_system_zone 7KB 7KB [ 2097.837953] ext4_io_end_vec 7KB 7KB [ 2097.838613] ext4_bio_post_read_ctx 15KB 15KB [ 2097.839324] kioctx 15KB 15KB [ 2097.839982] aio_kiocb 3KB 3KB [ 2097.840624] bio-2 4KB 4KB [ 2097.841281] fasync_cache 7KB 7KB [ 2097.841940] pid_namespace 7KB 7KB [ 2097.842600] rpc_buffers 31KB 31KB [ 2097.843257] rpc_tasks 3KB 3KB [ 2097.843915] UNIX 310KB 352KB [ 2097.844555] ip4-frags 15KB 15KB [ 2097.845214] UDP-Lite 31KB 31KB [ 2097.845870] tcp_bind_bucket 8KB 8KB [ 2097.846533] inet_peer_cache 4KB 4KB [ 2097.847194] ip_fib_trie 8KB 8KB [ 2097.847852] ip_fib_alias 15KB 15KB [ 2097.848492] ip_dst_cache 8KB 8KB [ 2097.849151] PING 62KB 62KB [ 2097.849809] RAW 93KB 93KB [ 2097.850462] UDP 101KB 283KB [ 2097.851120] tw_sock_TCP 7KB 7KB [ 2097.851779] request_sock_TCP 15KB 15KB [ 2097.852420] TCP 60KB 60KB [ 2097.853079] hugetlbfs_inode_cache 30KB 30KB [ 2097.853777] bio-1 11KB 11KB [ 2097.854437] eventpoll_pwq 23KB 23KB [ 2097.855096] eventpoll_epi 55KB 55KB [ 2097.855753] inotify_inode_mark 117KB 117KB [ 2097.856402] request_queue 30KB 30KB [ 2097.857059] blkdev_ioc 18KB 18KB [ 2097.857697] bio-0 60KB 60KB [ 2097.858372] biovec-max 454KB 565KB [ 2097.859030] biovec-64 126KB 173KB [ 2097.859669] biovec-16 15KB 15KB [ 2097.860326] uid_cache 8KB 8KB [ 2097.860984] dmaengine-unmap-2 4KB 4KB [ 2097.861623] audit_buffer 7KB 7KB [ 2097.862327] skbuff_fclone_cache 45KB 67KB [ 2097.863006] skbuff_head_cache 1173KB 1173KB [ 2097.863645] file_lock_cache 41KB 55KB [ 2097.864300] file_lock_ctx 7KB 7KB [ 2097.864956] fsnotify_mark_connector 40KB 40KB [ 2097.865655] net_namespace 86KB 86KB [ 2097.866330] task_delay_info 77KB 77KB [ 2097.866989] taskstats 38KB 38KB [ 2097.867628] proc_dir_entry 367KB 390KB [ 2097.868285] pde_opener 35KB 35KB [ 2097.868942] seq_file 75KB 75KB [ 2097.869580] sigqueue 82KB 82KB [ 2097.870257] shmem_inode_cache 1309KB 1320KB [ 2097.870914] kernfs_iattrs_cache 219KB 219KB [ 2097.871572] kernfs_node_cache 5157KB 5157KB [ 2097.872228] mnt_cache 181KB 181KB [ 2097.872910] filp 1263KB 2010KB [ 2097.873561] names_cache 9855KB 11215KB [ 2097.874257] hashtab_node 274KB 274KB [ 2097.874915] ebitmap_node 1149KB 1149KB [ 2097.875554] avtab_node 4976KB 4976KB [ 2097.876211] avc_node 31KB 31KB [ 2097.876871] lsm_inode_cache 3212KB 3249KB [ 2097.877512] lsm_file_cache 126KB 204KB [ 2097.878185] key_jar 31KB 31KB [ 2097.878842] uts_namespace 15KB 15KB [ 2097.879480] nsproxy 15KB 15KB [ 2097.880157] vm_area_struct 729KB 1020KB [ 2097.880814] fs_cache 61KB 64KB [ 2097.881452] files_cache 270KB 270KB [ 2097.882137] signal_cache 227KB 370KB [ 2097.882809] sighand_cache 272KB 360KB [ 2097.883451] task_struct 885KB 1155KB [ 2097.884111] cred_jar 121KB 168KB [ 2097.884772] anon_vma_chain 181KB 232KB [ 2097.885412] anon_vma 224KB 227KB [ 2097.886080] pid 71KB 71KB [ 2097.886756] Acpi-Operand 238KB 269KB [ 2097.887397] Acpi-ParseExt 27KB 27KB [ 2097.888056] Acpi-Parse 94KB 110KB [ 2097.888697] Acpi-State 94KB 110KB [ 2097.889355] Acpi-Namespace 24KB 24KB [ 2097.890014] numa_policy 3KB 3KB [ 2097.890673] trace_event_file 176KB 176KB [ 2097.891333] ftrace_event_field 280KB 280KB [ 2097.892002] pool_workqueue 32KB 32KB [ 2097.892641] task_group 16KB 16KB [ 2097.893299] mm_struct 315KB 315KB [ 2097.893957] vmap_area 94KB 94KB [ 2097.894618] page->ptl 143KB 196KB [ 2097.895278] kmemleak_scan_area 151KB 167KB [ 2097.895946] kmemleak_object 808438KB 808438KB [ 2097.896598] kmalloc-8k 4656KB 4832KB [ 2097.897275] kmalloc-4k 6544KB 8576KB [ 2097.897941] kmalloc-2k 3628KB 4224KB [ 2097.898616] kmalloc-1k 2242KB 3552KB [ 2097.899279] kmalloc-512 29632KB 29632KB [ 2097.899939] kmalloc-256 1106KB 1160KB [ 2097.900577] kmalloc-192 472KB 472KB [ 2097.901240] kmalloc-128 460KB 504KB [ 2097.901901] kmalloc-96 524KB 592KB [ 2097.902571] kmalloc-64 1194KB 1204KB [ 2097.903234] kmalloc-32 98392KB 98392KB [ 2097.903891] kmalloc-16 356KB 356KB [ 2097.904529] kmalloc-8 310KB 310KB [ 2097.905184] kmem_cache_node 47KB 47KB [ 2097.905840] kmem_cache 71KB 71KB [ 2097.906492] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/ssh.service,task=syz-fuzzer,pid=259,uid=0 [ 2097.909304] Out of memory (oom_kill_allocating_task): Killed process 255 (syz-fuzzer) total-vm:1241536kB, anon-rss:230084kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:916kB oom_score_adj:0 VM DIAGNOSIS: 10:24:21 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=0000000000000000 RCX=1ffff11002f9be01 RDX=1ffff11002f9bef6 RSI=ffffffff8400011f RDI=ffff888017cdf7b0 RBP=ffff888017cdf838 RSP=ffff888017cdf6d8 R8 =0000000000000001 R9 =0000000000000001 R10=0000000000032042 R11=1ffff11002f9bee3 R12=ffff888017cdf868 R13=ffff888017cdf7b0 R14=1ffff11002f9bee3 R15=0000000000000020 RIP=ffffffff81107336 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f275e2b6700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f2096bb6750 CR3=0000000017c24000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffffff00ffffffffffffffffffffff XMM01=707465675f6c697475646f6d6d61705f XMM02=ff000000000000ff0000000000ff0000 XMM03=66207463656e6e6f6373696420646576 XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=0d0c0f0e09080b0a0504070601000302 XMM07=00000000000000000000000000000000 XMM08=000a0d732a2e25006c61746166003367 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=ffff88800f010948 RCX=ffffffff8126e3dc RDX=1ffff11001e02132 RSI=0000000000000008 RDI=ffff88800f010991 RBP=ffffffff8686ba00 RSP=ffff88804cf973d0 R8 =0000000000000000 R9 =ffffffff8686a6e7 R10=fffffbfff0d0d4dc R11=0000000000000001 R12=ffff88800f010000 R13=ffff88800f010970 R14=0000000000000002 R15=0000000000020000 RIP=ffffffff8126e41c RFL=00000012 [----A--] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f275e295700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe6e00000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f209714eff0 CR3=0000000017c24000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=34323a3031203320206265463e38323c XMM01=646e6920796c6c617573752073696854 XMM02=206120666f206e6f6974616e696d7265 XMM03=656d656c706d69206563697672657320 XMM04=697461746e656d656c706d6920656369 XMM05=6976657270206120666f206e6f697461 XMM06=6574616369646e6920796c6c61757375 XMM07=732030323a34323a3031203320206265 XMM08=3a677562656420676f6c737973720000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000