0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:24:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:24:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1191.453545] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1191.455784] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1191.456993] EXT4-fs (loop6): unsupported inode size: 0 [ 1191.457436] EXT4-fs (loop6): blocksize: 2048 [ 1191.458608] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1191.460937] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1191.470098] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1191.471439] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1191.473268] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1191.474077] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1191.477189] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1191.482517] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1191.485186] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1191.505802] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1191.509412] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 11:24:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:24:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:24:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:24:49 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:24:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:24:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:24:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:24:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1191.654056] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1191.656560] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1191.671450] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1191.673989] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1191.700421] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1191.706873] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1191.714004] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1191.714060] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1191.746122] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1191.753784] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1191.776082] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1191.792464] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1191.798016] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 11:25:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1203.989043] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1204.000002] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1204.001405] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1204.014816] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1204.020647] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1204.022224] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1204.027065] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1204.029599] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1204.036949] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1204.049866] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1204.057636] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1204.059856] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1204.069513] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1204.083008] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 11:25:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:25:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1204.268859] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1204.270030] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1204.288083] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1204.288808] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1204.296757] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1204.332875] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1204.340321] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 11:25:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1204.370321] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:25:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1204.426171] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1204.465488] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1204.479136] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1204.495551] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1204.520945] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1204.566567] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1204.589543] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 11:25:15 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 11:25:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:15 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1218.056617] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1218.067112] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1218.069217] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1218.074887] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1218.080500] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1218.083296] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1218.091774] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1218.094180] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1218.095032] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1218.095474] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1218.105135] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1218.110185] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1218.141384] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1218.156236] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:25:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 11:25:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:27 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:25:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:27 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1230.508922] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1230.519580] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1230.533520] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1230.542308] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1230.543585] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1230.562751] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1230.569462] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1230.570848] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1230.591836] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1230.603117] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1230.613520] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1230.614879] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 1230.617830] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1230.628454] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1230.630024] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1230.631372] EXT4-fs (loop6): get root inode failed [ 1230.632151] EXT4-fs (loop6): mount failed 11:25:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') [ 1230.747809] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 11:25:28 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:25:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:28 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1230.823988] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 11:25:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1230.834031] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1230.846327] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 11:25:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 1230.862814] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1230.872843] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem 11:25:28 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:25:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1230.884478] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1230.903525] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1230.907118] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1230.927570] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1230.946776] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1230.953315] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1230.959162] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 11:25:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1230.964604] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1230.993203] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1231.045822] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1231.057071] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1231.073106] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:25:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:41 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 11:25:41 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:25:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1244.362573] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1244.387290] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1244.393582] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1244.399310] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1244.401284] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1244.405614] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1244.418849] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1244.421991] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1244.426354] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1244.428403] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1244.434986] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1244.472115] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1244.475435] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1244.502449] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1244.505620] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:25:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1244.624342] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 11:25:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 11:25:42 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:42 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:25:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1244.706498] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1244.736221] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1244.743796] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1244.744889] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1244.765737] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1244.778139] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1244.781407] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 11:25:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1244.818964] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1244.822501] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1244.832778] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1244.855550] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1244.874551] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1244.876300] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1244.906135] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1244.978186] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1244.990887] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1257.935587] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem 11:25:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:55 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:25:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:55 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 11:25:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1257.956284] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1257.960072] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1257.971414] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1257.976206] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1257.981292] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1257.990333] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 11:25:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1258.009556] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1258.011790] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1258.026478] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1258.033267] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1258.037054] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1258.044436] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1258.086175] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 11:25:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 11:25:55 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:25:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1258.149056] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1258.198106] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 11:25:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1258.213093] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1258.229338] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 11:25:55 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1258.255570] EXT4-fs (loop6): unsupported inode size: 0 [ 1258.256036] EXT4-fs (loop6): blocksize: 2048 11:25:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1258.318798] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1258.322381] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1258.329772] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1258.346607] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1258.374532] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1258.376347] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1258.383342] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1258.399232] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:26:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:26:08 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1271.253938] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 11:26:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:08 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 11:26:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1271.280737] EXT4-fs (loop0): unsupported inode size: 0 [ 1271.281196] EXT4-fs (loop0): blocksize: 2048 [ 1271.281832] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1271.283312] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1271.286487] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1271.288026] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1271.293074] EXT4-fs (loop6): invalid first ino: 0 [ 1271.301568] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1271.303057] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1271.306348] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1271.317569] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1271.322287] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1271.350487] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:26:20 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:26:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 11:26:20 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:26:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 11:26:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1283.389140] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1283.423213] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1283.436848] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1283.441159] EXT4-fs (loop6): unsupported inode size: 0 [ 1283.442301] EXT4-fs (loop6): blocksize: 2048 [ 1283.447392] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1283.453098] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1283.459160] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1283.468561] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1283.471750] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1283.473270] EXT4-fs (loop0): invalid first ino: 0 [ 1283.506361] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 11:26:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 11:26:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1283.560470] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1283.580058] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 11:26:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 11:26:21 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:26:21 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000", 0x19, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1283.683714] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 11:26:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1283.734609] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1283.736320] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1283.752948] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 11:26:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') [ 1283.772689] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1283.774040] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1283.778700] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1283.783987] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1283.792131] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1283.793953] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1283.796236] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1283.816657] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1283.821974] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1283.826112] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 1283.831493] EXT4-fs (loop0): get root inode failed [ 1283.831945] EXT4-fs (loop0): mount failed 11:26:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 11:26:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1283.855831] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 11:26:21 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:26:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1283.921782] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem 11:26:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 1283.933598] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1283.947255] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1283.950181] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:26:21 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1284.003359] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1284.004889] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1284.021719] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1284.025859] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1284.026484] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1284.029306] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1284.040980] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1284.042329] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1284.063551] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 11:26:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:26:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 11:26:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:33 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:26:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1295.573973] EXT4-fs (loop1): unsupported inode size: 0 [ 1295.574444] EXT4-fs (loop1): blocksize: 2048 [ 1295.598492] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1295.599481] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1295.613023] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1295.623186] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1295.625025] EXT4-fs (loop6): invalid first ino: 0 [ 1295.627244] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1295.629799] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1295.636995] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1295.644592] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1295.647512] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1295.653151] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:26:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1295.658392] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 1295.669016] EXT4-fs (loop0): get root inode failed [ 1295.669429] EXT4-fs (loop0): mount failed 11:26:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:33 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:33 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1295.791023] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1295.838216] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1295.839555] EXT4-fs (loop6): invalid first ino: 0 [ 1295.896786] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1295.908669] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:26:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f", 0x14, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 11:26:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008", 0x17, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 11:26:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:46 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1308.684323] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1308.685241] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1308.686693] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1308.689751] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1308.695914] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 1308.699010] EXT4-fs (loop6): get root inode failed [ 1308.699851] EXT4-fs (loop6): mount failed [ 1308.700634] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1308.702155] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1308.703611] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1308.705025] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 1308.707676] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1308.708938] EXT4-fs (loop1): get root inode failed [ 1308.709121] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1308.709699] EXT4-fs (loop1): mount failed [ 1308.714079] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 1308.717951] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1308.719264] EXT4-fs (loop0): get root inode failed [ 1308.719941] EXT4-fs (loop0): mount failed [ 1308.744358] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1308.749272] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:26:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 11:26:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:26:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1308.842908] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1308.911365] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1308.933604] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 1308.934785] EXT4-fs (loop0): get root inode failed [ 1308.935181] EXT4-fs (loop0): mount failed 11:27:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:27:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:27:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:27:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 11:27:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:27:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:27:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:27:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f", 0x14, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1328.602671] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1328.614708] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1328.615681] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1328.618914] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1328.619450] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1328.620365] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1328.627026] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1328.627364] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1328.634870] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1328.641306] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1328.646880] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 1328.650804] EXT4-fs (loop6): get root inode failed [ 1328.651477] EXT4-fs (loop6): mount failed [ 1328.653846] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 11:27:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:27:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 11:27:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:27:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:27:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:27:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1328.807514] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 11:27:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:27:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1328.826960] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1328.838340] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1328.846154] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1328.874738] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1328.882704] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 11:27:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 1328.904896] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:27:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:27:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1328.944352] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1328.944809] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1328.950513] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1328.965521] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1328.976472] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 11:27:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 11:27:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1329.026075] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1329.082557] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1329.086931] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1329.087905] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1329.089253] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1329.090149] EXT4-fs (loop2): group descriptors corrupted! [ 1329.098094] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1329.114897] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1332.461014] kworker/dying (323) used greatest stack depth: 23512 bytes left 11:27:19 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:27:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:27:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 11:27:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 11:27:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:27:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:27:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:27:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') [ 1342.131575] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1342.150846] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1342.152578] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1342.154439] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1342.155077] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1342.156690] EXT4-fs (loop1): group descriptors corrupted! [ 1342.166329] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1342.173468] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1342.177753] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1342.179222] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1342.235277] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1342.238103] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 11:27:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1342.257047] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:27:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 11:27:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1342.331488] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem 11:27:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1342.340984] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1342.342368] EXT4-fs (loop6): group descriptors corrupted! [ 1342.416067] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1342.423900] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1342.446685] EXT4-fs error (device loop2): ext4_fill_super:4962: inode #2: comm syz-executor.2: iget: special inode unallocated [ 1342.448882] EXT4-fs (loop2): get root inode failed [ 1342.448974] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1342.449656] EXT4-fs (loop2): mount failed 11:27:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:27:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 11:27:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 11:27:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:27:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:27:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:27:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:27:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1354.480257] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1354.486899] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1354.495165] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1354.503173] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1354.504251] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1354.505097] EXT4-fs (loop0): group descriptors corrupted! [ 1354.506347] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1354.506547] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1354.509262] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1354.524584] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1354.531143] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1354.533293] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1354.533981] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:27:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1354.609068] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 11:27:32 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(0x0, &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:27:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:27:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:27:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:27:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:27:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 11:27:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 11:27:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1354.689909] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1354.691524] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1354.692883] EXT4-fs (loop6): group descriptors corrupted! [ 1354.719285] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1354.722184] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1354.728100] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1354.729469] EXT4-fs (loop2): group descriptors corrupted! [ 1354.730578] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1354.737065] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1354.737958] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1354.738722] EXT4-fs (loop3): group descriptors corrupted! [ 1354.740260] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1354.741025] EXT4-fs (loop0): group descriptors corrupted! [ 1354.744413] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1354.760483] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 11:27:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1354.779331] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1354.787853] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1354.800356] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1354.814957] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1354.823977] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1354.825303] EXT4-fs (loop6): group descriptors corrupted! 11:27:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:27:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 11:27:32 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(0x0, &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1354.935395] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1354.940919] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1354.948101] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1354.957268] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:27:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:27:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 11:27:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:27:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 11:27:46 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(0x0, &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:27:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:27:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:27:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1369.355417] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1369.363828] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1369.365210] EXT4-fs (loop3): group descriptors corrupted! [ 1369.384006] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1369.387726] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1369.394019] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1369.395948] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1369.397264] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1369.398490] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1369.398531] EXT4-fs (loop6): group descriptors corrupted! [ 1369.402843] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1369.405905] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1369.411071] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1369.412472] EXT4-fs (loop0): group descriptors corrupted! [ 1369.413801] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1369.417201] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1369.418625] EXT4-fs (loop1): group descriptors corrupted! [ 1369.426522] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1369.443856] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1369.445378] EXT4-fs (loop2): group descriptors corrupted! [ 1369.469311] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:27:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 11:27:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:27:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:27:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1369.636487] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1369.644011] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1369.645415] EXT4-fs (loop6): group descriptors corrupted! [ 1369.683694] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1369.693922] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1369.695250] EXT4-fs (loop0): group descriptors corrupted! 11:28:00 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', 0x0) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:28:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1383.326767] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1383.330527] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1383.331442] EXT4-fs (loop3): group descriptors corrupted! [ 1383.359326] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1383.360824] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1383.361788] EXT4-fs (loop5): group descriptors corrupted! [ 1383.382401] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1383.384838] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1383.386743] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1383.387050] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1383.388377] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1383.390099] EXT4-fs (loop6): group descriptors corrupted! [ 1383.394249] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1383.397243] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1383.398448] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1383.399317] EXT4-fs (loop0): group descriptors corrupted! [ 1383.399818] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1383.401227] EXT4-fs (loop4): group descriptors corrupted! [ 1383.407983] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1383.412904] EXT4-fs (loop2): bad geometry: block count 128 exceeds size of device (8 blocks) [ 1383.425890] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1383.427253] EXT4-fs (loop1): group descriptors corrupted! 11:28:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', 0x0) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:28:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1383.573868] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1383.575881] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1383.576710] EXT4-fs (loop0): group descriptors corrupted! 11:28:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:01 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1383.661799] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1383.663466] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1383.664935] EXT4-fs (loop3): group descriptors corrupted! [ 1383.678225] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1383.679466] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1383.679766] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1383.682136] EXT4-fs (loop1): group descriptors corrupted! [ 1383.685366] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1383.686817] EXT4-fs (loop4): group descriptors corrupted! [ 1383.706979] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1383.741036] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1383.750556] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1383.752831] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1383.754222] EXT4-fs (loop5): group descriptors corrupted! 11:28:14 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:14 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', 0x0) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:28:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:28:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1396.990287] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1397.006165] EXT4-fs error (device loop2): ext4_fill_super:4962: inode #2: comm syz-executor.2: iget: special inode unallocated [ 1397.008285] EXT4-fs (loop2): get root inode failed [ 1397.009182] EXT4-fs (loop2): mount failed [ 1397.028241] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1397.035154] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1397.036440] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1397.037981] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1397.038948] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1397.040462] EXT4-fs (loop6): group descriptors corrupted! [ 1397.041028] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1397.042620] EXT4-fs (loop4): group descriptors corrupted! [ 1397.043682] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1397.043694] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1397.044014] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1397.045047] EXT4-fs (loop5): group descriptors corrupted! [ 1397.046490] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1397.049348] EXT4-fs (loop0): group descriptors corrupted! [ 1397.059038] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 1397.059786] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1397.062509] EXT4-fs (loop1): get root inode failed [ 1397.063356] EXT4-fs (loop1): mount failed [ 1397.074262] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1397.077128] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1397.078613] EXT4-fs (loop3): group descriptors corrupted! 11:28:14 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(0x0, &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:28:14 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:28:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1397.244093] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1397.272302] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:28:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1397.354292] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1397.356039] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1397.357402] EXT4-fs (loop6): group descriptors corrupted! [ 1397.368016] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1397.396083] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1397.397426] EXT4-fs (loop5): group descriptors corrupted! [ 1397.398476] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1397.408345] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1397.409792] EXT4-fs (loop3): group descriptors corrupted! [ 1397.433863] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1397.443433] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 1397.447633] EXT4-fs (loop0): mount failed [ 1397.472156] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1397.479571] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1397.481085] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 1397.483743] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1397.485162] EXT4-fs (loop4): group descriptors corrupted! [ 1397.486763] EXT4-fs (loop1): get root inode failed [ 1397.487530] EXT4-fs (loop1): mount failed 11:28:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:27 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(0x0, &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:28:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:28:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:28:27 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1409.624866] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1409.626123] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1409.627297] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1409.628213] EXT4-fs (loop3): group descriptors corrupted! [ 1409.629136] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1409.630060] EXT4-fs (loop4): group descriptors corrupted! [ 1409.630820] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1409.632030] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1409.632952] EXT4-fs (loop5): group descriptors corrupted! [ 1409.641927] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1409.643548] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1409.645190] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1409.646109] EXT4-fs (loop0): group descriptors corrupted! [ 1409.648889] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1409.656501] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1409.659906] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1409.661387] EXT4-fs (loop2): group descriptors corrupted! [ 1409.662544] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 1409.664382] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1409.665447] EXT4-fs (loop6): mount failed [ 1409.669055] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1409.673014] EXT4-fs (loop1): mount failed [ 1409.701921] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:28:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:28:27 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:27 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(0x0, &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:28:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1409.906480] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1409.917208] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1409.920904] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 1409.921819] EXT4-fs (loop2): mount failed [ 1409.936815] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 1409.937878] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1409.939942] EXT4-fs (loop0): get root inode failed [ 1409.940749] EXT4-fs (loop0): mount failed [ 1409.940850] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1409.942736] EXT4-fs (loop6): group descriptors corrupted! [ 1409.946171] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1409.959361] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1409.979361] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1409.981839] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 1409.983975] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 1409.984931] EXT4-fs (loop4): mount failed [ 1409.996246] EXT4-fs (loop5): get root inode failed [ 1409.998214] EXT4-fs (loop5): mount failed [ 1410.017552] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 1410.020058] EXT4-fs (loop1): get root inode failed [ 1410.020890] EXT4-fs (loop1): mount failed [ 1410.032355] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1410.058390] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:28:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:39 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), 0x0, &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:28:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:39 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1422.462876] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem 11:28:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539", 0x1f, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1422.479169] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 1422.481964] EXT4-fs (loop5): get root inode failed [ 1422.482910] EXT4-fs (loop5): mount failed [ 1422.489111] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1422.490757] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1422.495721] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1422.496577] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1422.498396] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1422.499259] EXT4-fs (loop0): group descriptors corrupted! [ 1422.502772] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1422.511057] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1422.512108] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1422.512913] EXT4-fs (loop6): group descriptors corrupted! [ 1422.513468] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1422.514941] EXT4-fs error (device loop2): ext4_fill_super:4962: inode #2: comm syz-executor.2: iget: special inode unallocated [ 1422.516212] EXT4-fs (loop2): get root inode failed [ 1422.516672] EXT4-fs (loop2): mount failed [ 1422.523494] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 1422.525894] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1422.526183] EXT4-fs (loop1): get root inode failed [ 1422.527761] EXT4-fs (loop1): mount failed [ 1422.527996] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1422.535956] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 11:28:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1422.665255] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1422.669588] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 1422.672130] EXT4-fs (loop6): get root inode failed [ 1422.672932] EXT4-fs (loop6): mount failed 11:28:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:28:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:40 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), 0x0, &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1422.709515] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1422.714681] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1422.720542] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 11:28:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1422.745064] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1422.770030] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1422.780234] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 11:28:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1422.799822] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 1422.801216] EXT4-fs (loop1): get root inode failed [ 1422.801651] EXT4-fs (loop1): mount failed [ 1422.807176] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 1422.807741] EXT4-fs (loop4): mount failed [ 1422.844714] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1422.855404] EXT4-fs error (device loop3): ext4_fill_super:4962: inode #2: comm syz-executor.3: iget: special inode unallocated [ 1422.856611] EXT4-fs (loop3): get root inode failed [ 1422.857021] EXT4-fs (loop3): mount failed [ 1422.868498] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1422.871382] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1422.894672] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 1422.895545] EXT4-fs (loop5): mount failed [ 1422.904450] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 1422.915297] EXT4-fs (loop6): get root inode failed [ 1422.916187] EXT4-fs (loop6): mount failed [ 1422.943571] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1422.958077] EXT4-fs error (device loop2): ext4_fill_super:4962: inode #2: comm syz-executor.2: iget: special inode unallocated [ 1422.959248] EXT4-fs (loop2): get root inode failed [ 1422.960120] EXT4-fs (loop2): mount failed 11:28:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:54 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:28:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:54 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), 0x0, &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1437.153441] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1437.164058] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 1437.165556] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1437.168949] EXT4-fs (loop1): get root inode failed [ 1437.169769] EXT4-fs (loop1): mount failed [ 1437.173359] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1437.183239] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 1437.186894] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 1437.189682] EXT4-fs (loop5): get root inode failed [ 1437.190830] EXT4-fs (loop5): mount failed [ 1437.191945] EXT4-fs (loop0): get root inode failed [ 1437.192883] EXT4-fs (loop0): mount failed [ 1437.202979] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1437.212070] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1437.217028] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1437.218414] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1437.224301] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1437.243924] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 1437.246192] EXT4-fs error (device loop3): ext4_fill_super:4962: inode #2: comm syz-executor.3: iget: special inode unallocated [ 1437.248155] EXT4-fs (loop6): get root inode failed [ 1437.248969] EXT4-fs (loop6): mount failed [ 1437.249883] EXT4-fs (loop3): get root inode failed [ 1437.250687] EXT4-fs (loop3): mount failed [ 1437.298143] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 1437.298887] EXT4-fs (loop4): mount failed [ 1437.330486] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1437.330909] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 11:28:54 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:28:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1437.469270] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1437.476968] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1437.481023] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 1437.482014] EXT4-fs (loop6): mount failed [ 1437.500631] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 1437.506199] EXT4-fs (loop0): get root inode failed [ 1437.507098] EXT4-fs (loop0): mount failed 11:29:10 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0", 0x11, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', 0x0, 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:29:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:29:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1452.950387] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1452.952209] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 1452.953384] EXT4-fs (loop6): get root inode failed [ 1452.953808] EXT4-fs (loop6): mount failed [ 1452.975253] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1452.975703] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1452.977183] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1452.987710] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1452.988961] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1452.991406] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1452.996724] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1453.006180] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 1453.007985] EXT4-fs error (device loop4): ext4_fill_super:4962: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1453.010004] EXT4-fs (loop5): get root inode failed [ 1453.010403] EXT4-fs (loop5): mount failed [ 1453.011088] EXT4-fs (loop4): get root inode failed [ 1453.011472] EXT4-fs (loop4): mount failed [ 1453.014848] EXT4-fs error (device loop3): ext4_fill_super:4962: inode #2: comm syz-executor.3: iget: special inode unallocated [ 1453.017408] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 1453.022754] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 1453.025801] EXT4-fs (loop3): get root inode failed [ 1453.026529] EXT4-fs (loop3): mount failed [ 1453.028121] EXT4-fs (loop1): get root inode failed [ 1453.028974] EXT4-fs (loop1): mount failed [ 1453.029821] EXT4-fs (loop0): get root inode failed [ 1453.030702] EXT4-fs (loop0): mount failed 11:29:10 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100), 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1453.049089] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1453.050373] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 11:29:10 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0", 0x11, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0", 0x11, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0", 0x11, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:29:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', 0x0, 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:29:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0", 0x11, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0", 0x11, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1453.228899] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1453.233225] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1453.239522] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1453.247840] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 1453.250291] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1453.252264] EXT4-fs (loop5): get root inode failed [ 1453.252289] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1453.253084] EXT4-fs (loop5): mount failed [ 1453.255059] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1453.257362] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1453.266673] EXT4-fs error (device loop3): ext4_fill_super:4962: inode #2: comm syz-executor.3: iget: special inode unallocated [ 1453.268666] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1453.270543] EXT4-fs (loop3): get root inode failed [ 1453.271459] EXT4-fs (loop3): mount failed [ 1453.278300] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1453.289243] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 1453.290915] EXT4-fs (loop0): get root inode failed [ 1453.291514] EXT4-fs (loop0): mount failed [ 1453.295803] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1453.299407] EXT4-fs error (device loop4): ext4_fill_super:4962: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1453.306705] EXT4-fs (loop4): get root inode failed [ 1453.307411] EXT4-fs (loop4): mount failed 11:29:10 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0", 0x11, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:10 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', 0x0, 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:29:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100), 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0", 0x11, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0", 0x11, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1453.410747] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1453.417259] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1453.438408] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 11:29:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100), 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1453.451364] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:29:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100), 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1453.455419] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 1453.465373] EXT4-fs (loop6): get root inode failed [ 1453.466238] EXT4-fs (loop6): mount failed [ 1453.468078] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 1453.471607] EXT4-fs (loop0): get root inode failed [ 1453.472107] EXT4-fs (loop0): mount failed [ 1453.473918] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1453.499880] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 1453.511127] EXT4-fs (loop1): get root inode failed [ 1453.512160] EXT4-fs (loop1): mount failed [ 1453.539124] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1453.546705] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1453.553054] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1453.563373] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 1453.564890] EXT4-fs error (device loop2): ext4_fill_super:4962: inode #2: comm syz-executor.2: iget: special inode unallocated [ 1453.565192] EXT4-fs (loop5): get root inode failed [ 1453.567240] EXT4-fs (loop5): mount failed [ 1453.567988] EXT4-fs error (device loop3): ext4_fill_super:4962: inode #2: comm syz-executor.3: iget: special inode unallocated [ 1453.571583] EXT4-fs (loop3): get root inode failed [ 1453.572072] EXT4-fs (loop3): mount failed [ 1453.572993] EXT4-fs (loop2): get root inode failed [ 1453.573827] EXT4-fs (loop2): mount failed 11:29:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:22 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x0, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:29:22 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1465.452659] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1465.460464] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 1465.464014] EXT4-fs (loop1): get root inode failed [ 1465.464480] EXT4-fs (loop1): mount failed 11:29:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1465.488434] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1465.489658] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1465.495777] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1465.496597] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1465.496841] EXT4-fs error (device loop3): ext4_fill_super:4962: inode #2: comm syz-executor.3: iget: special inode unallocated [ 1465.500628] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 1465.504006] EXT4-fs (loop3): get root inode failed [ 1465.504846] EXT4-fs (loop3): mount failed [ 1465.505748] EXT4-fs (loop0): get root inode failed [ 1465.506465] EXT4-fs (loop0): mount failed [ 1465.514045] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1465.521013] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 1465.523347] EXT4-fs (loop6): get root inode failed [ 1465.523815] EXT4-fs (loop6): mount failed [ 1465.524844] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 1465.526032] EXT4-fs (loop5): get root inode failed [ 1465.526438] EXT4-fs (loop5): mount failed [ 1465.529295] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1465.530873] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:29:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1465.567761] EXT4-fs error (device loop4): ext4_fill_super:4962: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1465.578142] EXT4-fs (loop4): get root inode failed [ 1465.578903] EXT4-fs (loop4): mount failed [ 1465.586947] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1465.609542] EXT4-fs error (device loop2): ext4_fill_super:4962: inode #2: comm syz-executor.2: iget: special inode unallocated [ 1465.615224] EXT4-fs (loop2): get root inode failed [ 1465.615976] EXT4-fs (loop2): mount failed 11:29:23 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1465.721671] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1465.743100] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 1465.745022] EXT4-fs (loop6): get root inode failed [ 1465.745779] EXT4-fs (loop6): mount failed [ 1465.762085] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1465.766996] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 1465.769119] EXT4-fs (loop1): get root inode failed [ 1465.769936] EXT4-fs (loop1): mount failed [ 1465.778058] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1465.782880] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 1465.784069] EXT4-fs (loop0): get root inode failed [ 1465.784480] EXT4-fs (loop0): mount failed [ 1479.552685] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 11:29:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100), 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:29:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100), 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:36 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x0, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:29:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:36 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1479.568670] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 1479.571196] EXT4-fs (loop1): get root inode failed [ 1479.572263] EXT4-fs (loop1): mount failed 11:29:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1479.594482] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1479.597037] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1479.597744] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1479.600053] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1479.606650] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1479.615648] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 1479.616916] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 1479.618099] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 1479.619492] EXT4-fs (loop5): get root inode failed [ 1479.619939] EXT4-fs (loop5): mount failed [ 1479.620618] EXT4-fs (loop6): get root inode failed [ 1479.621036] EXT4-fs (loop6): mount failed [ 1479.621469] EXT4-fs (loop0): get root inode failed [ 1479.621939] EXT4-fs (loop0): mount failed [ 1479.622359] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1479.640091] EXT4-fs error (device loop4): ext4_fill_super:4962: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1479.643003] EXT4-fs (loop4): get root inode failed [ 1479.643762] EXT4-fs (loop4): mount failed [ 1479.656633] EXT4-fs error (device loop2): ext4_fill_super:4962: inode #2: comm syz-executor.2: iget: special inode unallocated [ 1479.658681] EXT4-fs (loop2): get root inode failed [ 1479.659405] EXT4-fs (loop2): mount failed 11:29:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1479.683077] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1479.693652] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1479.714148] EXT4-fs error (device loop3): ext4_fill_super:4962: inode #2: comm syz-executor.3: iget: special inode unallocated [ 1479.715638] EXT4-fs (loop3): get root inode failed [ 1479.716051] EXT4-fs (loop3): mount failed 11:29:37 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:37 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x0, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:29:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1479.818777] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1479.830471] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 1479.832924] EXT4-fs (loop6): get root inode failed [ 1479.834712] EXT4-fs (loop6): mount failed [ 1479.845305] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1479.854898] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1479.858466] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 1479.860250] EXT4-fs (loop0): get root inode failed [ 1479.860821] EXT4-fs (loop0): mount failed [ 1479.865364] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:29:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:29:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:29:49 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:29:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1491.663888] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1491.665082] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1491.665956] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1491.674198] EXT4-fs error (device loop4): ext4_fill_super:4962: inode #2: comm syz-executor.4: iget: special inode unallocated [ 1491.677244] EXT4-fs (loop4): get root inode failed [ 1491.677817] EXT4-fs (loop4): mount failed [ 1491.685712] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1491.691850] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 1491.694477] EXT4-fs (loop1): get root inode failed [ 1491.695364] EXT4-fs (loop1): mount failed 11:29:49 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:29:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:29:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1491.820707] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1491.820733] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1491.823005] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (8 blocks) [ 1491.835348] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:30:02 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:30:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:30:02 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:30:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1504.646234] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1504.649923] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1504.658691] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 1504.660953] EXT4-fs (loop0): get root inode failed [ 1504.661764] EXT4-fs (loop0): mount failed [ 1504.671917] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1504.674025] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (8 blocks) 11:30:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1504.683028] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1504.687547] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1504.692325] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (8 blocks) [ 1504.692460] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1504.703716] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1504.712419] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (8 blocks) [ 1504.716717] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1504.743555] EXT4-fs error (device loop2): ext4_fill_super:4962: inode #2: comm syz-executor.2: iget: special inode unallocated [ 1504.751186] EXT4-fs error (device loop3): ext4_fill_super:4962: inode #2: comm syz-executor.3: iget: special inode unallocated [ 1504.777544] EXT4-fs (loop2): get root inode failed [ 1504.778275] EXT4-fs (loop2): mount failed [ 1504.787216] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1504.798668] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) [ 1504.807922] EXT4-fs (loop3): get root inode failed [ 1504.808693] EXT4-fs (loop3): mount failed 11:30:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:02 executing program 4: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:02 executing program 3: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:02 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:30:02 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:30:02 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1505.080745] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1505.083140] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) [ 1505.108859] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1505.139728] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:30:14 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:14 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:14 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:30:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:14 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:14 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:14 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1517.612100] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1517.625173] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) [ 1517.633186] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1517.693969] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:30:26 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:26 executing program 5: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:30:26 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:30:26 executing program 3: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:26 executing program 0: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:30:26 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1529.339083] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 11:30:26 executing program 0: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1529.398288] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:30:26 executing program 1: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:26 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:30:26 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:26 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:26 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1529.543636] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem 11:30:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1529.557580] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 11:30:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1529.580913] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1529.605212] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1529.606497] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1529.625841] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1529.631237] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1529.636314] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1529.639431] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1529.652262] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 11:30:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) lgetxattr(&(0x7f0000000300)='mnt/encrypted_dir\x00', &(0x7f0000000480)=@random={'security.', 'access=any'}, &(0x7f0000000580)=""/205, 0xcd) sendmmsg$inet6(r0, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) 11:30:40 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:30:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) lgetxattr(&(0x7f0000000300)='mnt/encrypted_dir\x00', &(0x7f0000000480)=@random={'security.', 'access=any'}, &(0x7f0000000580)=""/205, 0xcd) sendmmsg$inet6(r0, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) 11:30:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(r0, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) 11:30:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:30:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(r0, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:30:40 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000140)=""/44, 0x2c}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r4 = epoll_create(0x7ffd) readv(r4, &(0x7f0000000100), 0x1000000000000073) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_WAIT_SYNC(r4, 0x40089416, &(0x7f00000001c0)=r5) openat(r1, &(0x7f0000000240)='./file0\x00', 0x143, 0x2) writev(r2, &(0x7f00000000c0)=[{0x0}], 0x1) ioctl$BTRFS_IOC_QGROUP_CREATE(r2, 0x4010942a, &(0x7f0000000100)={0x0, 0x2}) pwritev(r3, &(0x7f0000000080)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1, 0x0, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000200), 0xa28c2, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x2, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r6) [ 1542.609068] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem 11:30:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) lgetxattr(&(0x7f0000000300)='mnt/encrypted_dir\x00', &(0x7f0000000480)=@random={'security.', 'access=any'}, &(0x7f0000000580)=""/205, 0xcd) sendmmsg$inet6(r0, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) [ 1542.618161] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1542.639120] 9pnet_virtio: no channels available for device syz 11:30:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 1) [ 1542.680313] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1542.683419] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1542.687315] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1542.698306] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1542.703834] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1542.705341] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 1542.716071] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1542.718691] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1542.720915] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 1542.729822] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1542.742443] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1542.751878] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1542.792462] 9pnet_virtio: no channels available for device syz 11:30:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 1) 11:30:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) lgetxattr(&(0x7f0000000300)='mnt/encrypted_dir\x00', &(0x7f0000000480)=@random={'security.', 'access=any'}, &(0x7f0000000580)=""/205, 0xcd) sendmmsg$inet6(r0, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) 11:30:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 1) [ 1542.868435] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem 11:30:40 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1542.908793] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1542.918724] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1542.931462] FAULT_INJECTION: forcing a failure. [ 1542.931462] name failslab, interval 1, probability 0, space 0, times 1 [ 1542.933402] CPU: 1 PID: 11473 Comm: syz-executor.6 Not tainted 5.10.218 #1 [ 1542.934412] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1542.935609] Call Trace: [ 1542.936006] dump_stack+0x107/0x167 [ 1542.936540] should_fail.cold+0x5/0xa [ 1542.937104] ? getname_flags.part.0+0x50/0x4f0 [ 1542.937798] should_failslab+0x5/0x20 [ 1542.938351] kmem_cache_alloc+0x5b/0x310 [ 1542.938954] getname_flags.part.0+0x50/0x4f0 [ 1542.939601] getname_flags+0x9a/0xe0 [ 1542.940156] __x64_sys_rename+0x56/0xa0 [ 1542.940738] do_syscall_64+0x33/0x40 [ 1542.941296] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1542.942041] RIP: 0033:0x7f7c5b06ab19 11:30:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1542.942588] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1542.945435] RSP: 002b:00007f7c585e0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1542.946532] RAX: ffffffffffffffda RBX: 00007f7c5b17df60 RCX: 00007f7c5b06ab19 [ 1542.947557] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1542.948572] RBP: 00007f7c585e01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1542.949598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1542.950617] R13: 00007ffd64c2920f R14: 00007f7c585e0300 R15: 0000000000022000 [ 1542.962692] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1542.966989] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 11:30:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) lgetxattr(&(0x7f0000000300)='mnt/encrypted_dir\x00', &(0x7f0000000480)=@random={'security.', 'access=any'}, &(0x7f0000000580)=""/205, 0xcd) sendmmsg$inet6(r0, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) [ 1542.993747] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 11:30:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 1) [ 1543.008377] FAULT_INJECTION: forcing a failure. [ 1543.008377] name failslab, interval 1, probability 0, space 0, times 0 [ 1543.010431] CPU: 0 PID: 11482 Comm: syz-executor.1 Not tainted 5.10.218 #1 [ 1543.011503] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1543.012771] Call Trace: [ 1543.013200] dump_stack+0x107/0x167 [ 1543.013787] should_fail.cold+0x5/0xa [ 1543.014373] ? getname_flags.part.0+0x50/0x4f0 [ 1543.015069] should_failslab+0x5/0x20 [ 1543.015661] kmem_cache_alloc+0x5b/0x310 [ 1543.016299] getname_flags.part.0+0x50/0x4f0 [ 1543.016952] getname_flags+0x9a/0xe0 [ 1543.017532] __x64_sys_rename+0x56/0xa0 [ 1543.018148] do_syscall_64+0x33/0x40 [ 1543.018723] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1543.019500] RIP: 0033:0x7f3e3bf6bb19 [ 1543.020079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1543.022887] RSP: 002b:00007f3e394e1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1543.024015] RAX: ffffffffffffffda RBX: 00007f3e3c07ef60 RCX: 00007f3e3bf6bb19 [ 1543.025108] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1543.026211] RBP: 00007f3e394e11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1543.027207] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1543.027304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1543.027324] R13: 00007ffd54513d4f R14: 00007f3e394e1300 R15: 0000000000022000 [ 1543.076341] FAULT_INJECTION: forcing a failure. [ 1543.076341] name failslab, interval 1, probability 0, space 0, times 0 [ 1543.078184] CPU: 0 PID: 11486 Comm: syz-executor.2 Not tainted 5.10.218 #1 [ 1543.079250] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1543.080519] Call Trace: [ 1543.080940] dump_stack+0x107/0x167 [ 1543.081534] should_fail.cold+0x5/0xa [ 1543.082161] ? getname_flags.part.0+0x50/0x4f0 [ 1543.082890] should_failslab+0x5/0x20 [ 1543.083500] kmem_cache_alloc+0x5b/0x310 [ 1543.084153] getname_flags.part.0+0x50/0x4f0 [ 1543.084864] getname_flags+0x9a/0xe0 [ 1543.085474] __x64_sys_rename+0x56/0xa0 [ 1543.086103] do_syscall_64+0x33/0x40 [ 1543.086700] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1543.087511] RIP: 0033:0x7f0bf9e7ab19 [ 1543.088102] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1543.090961] RSP: 002b:00007f0bf73f0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1543.092152] RAX: ffffffffffffffda RBX: 00007f0bf9f8df60 RCX: 00007f0bf9e7ab19 [ 1543.093265] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1543.094389] RBP: 00007f0bf73f01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1543.095512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1543.096641] R13: 00007ffd3ed8e5df R14: 00007f0bf73f0300 R15: 0000000000022000 [ 1543.101254] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1543.110970] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 11:30:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) lgetxattr(&(0x7f0000000300)='mnt/encrypted_dir\x00', &(0x7f0000000480)=@random={'security.', 'access=any'}, &(0x7f0000000580)=""/205, 0xcd) sendmmsg$inet6(r0, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) [ 1543.128029] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1543.129539] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1543.144184] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1543.154637] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1543.175937] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 11:30:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 2) [ 1543.199070] FAULT_INJECTION: forcing a failure. [ 1543.199070] name failslab, interval 1, probability 0, space 0, times 0 [ 1543.200677] CPU: 1 PID: 11497 Comm: syz-executor.0 Not tainted 5.10.218 #1 [ 1543.201621] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1543.202722] Call Trace: [ 1543.203089] dump_stack+0x107/0x167 [ 1543.203586] should_fail.cold+0x5/0xa [ 1543.204105] ? getname_flags.part.0+0x50/0x4f0 [ 1543.204731] should_failslab+0x5/0x20 [ 1543.205262] kmem_cache_alloc+0x5b/0x310 [ 1543.205841] getname_flags.part.0+0x50/0x4f0 [ 1543.206465] getname_flags+0x9a/0xe0 [ 1543.206991] __x64_sys_rename+0x56/0xa0 [ 1543.207548] do_syscall_64+0x33/0x40 [ 1543.208068] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1543.208774] RIP: 0033:0x7fed0f341b19 [ 1543.209314] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1543.211775] RSP: 002b:00007fed0c8b7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1543.212813] RAX: ffffffffffffffda RBX: 00007fed0f454f60 RCX: 00007fed0f341b19 [ 1543.213779] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1543.214758] RBP: 00007fed0c8b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 1543.215733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1543.216697] R13: 00007fffbca1454f R14: 00007fed0c8b7300 R15: 0000000000022000 [ 1543.261102] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1543.266736] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem 11:30:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 2) 11:30:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 2) [ 1543.275352] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1543.295899] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1543.299243] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 11:30:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 1) [ 1543.324878] FAULT_INJECTION: forcing a failure. [ 1543.324878] name failslab, interval 1, probability 0, space 0, times 0 [ 1543.326719] CPU: 1 PID: 11511 Comm: syz-executor.6 Not tainted 5.10.218 #1 [ 1543.327656] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1543.328769] Call Trace: [ 1543.329137] dump_stack+0x107/0x167 [ 1543.329651] should_fail.cold+0x5/0xa [ 1543.330181] ? create_object.isra.0+0x3a/0xa20 [ 1543.330804] should_failslab+0x5/0x20 [ 1543.331327] kmem_cache_alloc+0x5b/0x310 [ 1543.331881] create_object.isra.0+0x3a/0xa20 [ 1543.332479] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1543.333165] kmem_cache_alloc+0x159/0x310 [ 1543.333742] getname_flags.part.0+0x50/0x4f0 [ 1543.334340] getname_flags+0x9a/0xe0 [ 1543.334847] __x64_sys_rename+0x56/0xa0 [ 1543.335388] do_syscall_64+0x33/0x40 [ 1543.335904] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1543.336599] RIP: 0033:0x7f7c5b06ab19 [ 1543.337105] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1543.339575] RSP: 002b:00007f7c585e0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1543.340607] RAX: ffffffffffffffda RBX: 00007f7c5b17df60 RCX: 00007f7c5b06ab19 [ 1543.341570] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1543.342536] RBP: 00007f7c585e01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1543.343491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1543.344457] R13: 00007ffd64c2920f R14: 00007f7c585e0300 R15: 0000000000022000 [ 1543.431894] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1543.444929] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1543.457451] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1543.484206] FAULT_INJECTION: forcing a failure. [ 1543.484206] name failslab, interval 1, probability 0, space 0, times 0 [ 1543.486110] CPU: 0 PID: 11519 Comm: syz-executor.1 Not tainted 5.10.218 #1 [ 1543.487025] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1543.488115] Call Trace: [ 1543.488484] dump_stack+0x107/0x167 [ 1543.488972] should_fail.cold+0x5/0xa [ 1543.489477] ? create_object.isra.0+0x3a/0xa20 [ 1543.490089] should_failslab+0x5/0x20 [ 1543.490594] kmem_cache_alloc+0x5b/0x310 [ 1543.491132] create_object.isra.0+0x3a/0xa20 [ 1543.491699] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1543.492374] kmem_cache_alloc+0x159/0x310 [ 1543.492907] getname_flags.part.0+0x50/0x4f0 [ 1543.493499] getname_flags+0x9a/0xe0 [ 1543.494006] __x64_sys_rename+0x56/0xa0 [ 1543.494534] do_syscall_64+0x33/0x40 [ 1543.495032] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1543.495710] RIP: 0033:0x7f3e3bf6bb19 [ 1543.496205] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1543.498600] RSP: 002b:00007f3e394e1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1543.499537] RAX: ffffffffffffffda RBX: 00007f3e3c07ef60 RCX: 00007f3e3bf6bb19 [ 1543.500444] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1543.501352] RBP: 00007f3e394e11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1543.502269] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1543.503136] R13: 00007ffd54513d4f R14: 00007f3e394e1300 R15: 0000000000022000 [ 1543.510998] FAULT_INJECTION: forcing a failure. [ 1543.510998] name failslab, interval 1, probability 0, space 0, times 0 [ 1543.512819] CPU: 0 PID: 11524 Comm: syz-executor.2 Not tainted 5.10.218 #1 [ 1543.513695] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1543.514735] Call Trace: [ 1543.515082] dump_stack+0x107/0x167 [ 1543.515538] should_fail.cold+0x5/0xa [ 1543.516033] ? create_object.isra.0+0x3a/0xa20 [ 1543.516598] ? create_object.isra.0+0x3a/0xa20 [ 1543.517201] should_failslab+0x5/0x20 [ 1543.517717] kmem_cache_alloc+0x5b/0x310 [ 1543.518261] create_object.isra.0+0x3a/0xa20 [ 1543.518818] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1543.519477] kmem_cache_alloc+0x159/0x310 [ 1543.520026] getname_flags.part.0+0x50/0x4f0 [ 1543.520569] getname_flags+0x9a/0xe0 [ 1543.521060] __x64_sys_rename+0x56/0xa0 [ 1543.521583] do_syscall_64+0x33/0x40 [ 1543.522068] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1543.522725] RIP: 0033:0x7f0bf9e7ab19 [ 1543.523181] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1543.525376] RSP: 002b:00007f0bf73cf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1543.526345] RAX: ffffffffffffffda RBX: 00007f0bf9f8e020 RCX: 00007f0bf9e7ab19 [ 1543.527224] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1543.528073] RBP: 00007f0bf73cf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1543.528945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1543.529799] R13: 00007ffd3ed8e5df R14: 00007f0bf73cf300 R15: 0000000000022000 [ 1543.550262] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1543.563767] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1543.577114] FAULT_INJECTION: forcing a failure. [ 1543.577114] name failslab, interval 1, probability 0, space 0, times 0 [ 1543.578950] CPU: 1 PID: 11523 Comm: syz-executor.5 Not tainted 5.10.218 #1 [ 1543.579890] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1543.581007] Call Trace: [ 1543.581390] dump_stack+0x107/0x167 [ 1543.581892] should_fail.cold+0x5/0xa [ 1543.582415] ? getname_flags.part.0+0x50/0x4f0 [ 1543.583039] should_failslab+0x5/0x20 [ 1543.583561] kmem_cache_alloc+0x5b/0x310 [ 1543.584132] getname_flags.part.0+0x50/0x4f0 [ 1543.584733] getname_flags+0x9a/0xe0 [ 1543.585250] __x64_sys_rename+0x56/0xa0 [ 1543.585804] do_syscall_64+0x33/0x40 [ 1543.586316] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1543.587008] RIP: 0033:0x7fc03a1e8b19 [ 1543.587518] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1543.589987] RSP: 002b:00007fc03775e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1543.591018] RAX: ffffffffffffffda RBX: 00007fc03a2fbf60 RCX: 00007fc03a1e8b19 [ 1543.591974] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1543.592938] RBP: 00007fc03775e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1543.593904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1543.594865] R13: 00007fff5b4f0d5f R14: 00007fc03775e300 R15: 0000000000022000 11:30:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 2) 11:30:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 3) 11:30:53 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 3) 11:30:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 2) 11:30:53 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:30:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 1) 11:30:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 1) 11:30:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 3) [ 1555.962176] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1555.969943] FAULT_INJECTION: forcing a failure. [ 1555.969943] name failslab, interval 1, probability 0, space 0, times 0 [ 1555.971099] CPU: 1 PID: 11540 Comm: syz-executor.3 Not tainted 5.10.218 #1 [ 1555.971787] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1555.972603] Call Trace: [ 1555.972872] dump_stack+0x107/0x167 [ 1555.973239] should_fail.cold+0x5/0xa [ 1555.973638] ? getname_flags.part.0+0x50/0x4f0 [ 1555.974097] should_failslab+0x5/0x20 [ 1555.974477] kmem_cache_alloc+0x5b/0x310 [ 1555.974892] getname_flags.part.0+0x50/0x4f0 [ 1555.975332] getname_flags+0x9a/0xe0 [ 1555.975702] __x64_sys_rename+0x56/0xa0 [ 1555.976100] do_syscall_64+0x33/0x40 [ 1555.976475] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1555.976985] RIP: 0033:0x7f5dcd1beb19 [ 1555.977359] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1555.979176] RSP: 002b:00007f5dca734188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1555.979924] RAX: ffffffffffffffda RBX: 00007f5dcd2d1f60 RCX: 00007f5dcd1beb19 [ 1555.980641] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1555.981352] RBP: 00007f5dca7341d0 R08: 0000000000000000 R09: 0000000000000000 [ 1555.982072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1555.982781] R13: 00007ffd0ad18b7f R14: 00007f5dca734300 R15: 0000000000022000 [ 1556.005152] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1556.005277] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1556.006190] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1556.013225] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1556.022865] FAULT_INJECTION: forcing a failure. [ 1556.022865] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 1556.024104] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1556.025117] CPU: 1 PID: 11537 Comm: syz-executor.2 Not tainted 5.10.218 #1 [ 1556.025230] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1556.025816] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1556.025820] Call Trace: [ 1556.025833] dump_stack+0x107/0x167 [ 1556.025853] should_fail.cold+0x5/0xa [ 1556.028697] strncpy_from_user+0x34/0x470 [ 1556.029107] getname_flags.part.0+0x95/0x4f0 [ 1556.029565] getname_flags+0x9a/0xe0 [ 1556.029933] __x64_sys_rename+0x56/0xa0 [ 1556.030329] do_syscall_64+0x33/0x40 [ 1556.030700] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1556.031205] RIP: 0033:0x7f0bf9e7ab19 [ 1556.031569] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1556.033354] RSP: 002b:00007f0bf73f0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1556.034119] RAX: ffffffffffffffda RBX: 00007f0bf9f8df60 RCX: 00007f0bf9e7ab19 [ 1556.034811] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1556.035504] RBP: 00007f0bf73f01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1556.036199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1556.036898] R13: 00007ffd3ed8e5df R14: 00007f0bf73f0300 R15: 0000000000022000 [ 1556.039195] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1556.041007] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1556.041467] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1556.044272] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1556.046169] FAULT_INJECTION: forcing a failure. [ 1556.046169] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1556.047398] CPU: 1 PID: 11543 Comm: syz-executor.1 Not tainted 5.10.218 #1 [ 1556.048069] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1556.048883] Call Trace: [ 1556.049144] dump_stack+0x107/0x167 [ 1556.049524] should_fail.cold+0x5/0xa [ 1556.049904] strncpy_from_user+0x34/0x470 [ 1556.049954] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1556.050321] getname_flags.part.0+0x95/0x4f0 [ 1556.051898] getname_flags+0x9a/0xe0 [ 1556.052267] __x64_sys_rename+0x56/0xa0 [ 1556.052656] do_syscall_64+0x33/0x40 [ 1556.053018] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1556.053536] RIP: 0033:0x7f3e3bf6bb19 [ 1556.053906] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1556.055667] RSP: 002b:00007f3e394e1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1556.056397] RAX: ffffffffffffffda RBX: 00007f3e3c07ef60 RCX: 00007f3e3bf6bb19 [ 1556.057092] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1556.057800] RBP: 00007f3e394e11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1556.058487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1556.059191] R13: 00007ffd54513d4f R14: 00007f3e394e1300 R15: 0000000000022000 [ 1556.070767] FAULT_INJECTION: forcing a failure. [ 1556.070767] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1556.071960] CPU: 1 PID: 11568 Comm: syz-executor.6 Not tainted 5.10.218 #1 [ 1556.072630] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1556.073428] Call Trace: [ 1556.073707] dump_stack+0x107/0x167 [ 1556.074069] should_fail.cold+0x5/0xa [ 1556.074445] strncpy_from_user+0x34/0x470 [ 1556.074855] getname_flags.part.0+0x95/0x4f0 [ 1556.075297] getname_flags+0x9a/0xe0 [ 1556.075671] __x64_sys_rename+0x56/0xa0 [ 1556.076067] do_syscall_64+0x33/0x40 [ 1556.076087] FAULT_INJECTION: forcing a failure. [ 1556.076087] name failslab, interval 1, probability 0, space 0, times 0 [ 1556.077524] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1556.078025] RIP: 0033:0x7f7c5b06ab19 [ 1556.078386] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1556.080163] RSP: 002b:00007f7c585bf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1556.080908] RAX: ffffffffffffffda RBX: 00007f7c5b17e020 RCX: 00007f7c5b06ab19 [ 1556.081620] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1556.082312] RBP: 00007f7c585bf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1556.083003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1556.083689] R13: 00007ffd64c2920f R14: 00007f7c585bf300 R15: 0000000000022000 [ 1556.084396] CPU: 0 PID: 11552 Comm: syz-executor.4 Not tainted 5.10.218 #1 [ 1556.085430] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1556.086638] Call Trace: [ 1556.087033] dump_stack+0x107/0x167 [ 1556.087568] should_fail.cold+0x5/0xa [ 1556.088147] ? getname_flags.part.0+0x50/0x4f0 [ 1556.088433] FAULT_INJECTION: forcing a failure. [ 1556.088433] name failslab, interval 1, probability 0, space 0, times 0 [ 1556.088820] should_failslab+0x5/0x20 [ 1556.088839] kmem_cache_alloc+0x5b/0x310 [ 1556.088861] getname_flags.part.0+0x50/0x4f0 [ 1556.088881] getname_flags+0x9a/0xe0 [ 1556.088900] __x64_sys_rename+0x56/0xa0 [ 1556.088917] do_syscall_64+0x33/0x40 [ 1556.088934] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1556.088947] RIP: 0033:0x7f02e567bb19 [ 1556.088964] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1556.088974] RSP: 002b:00007f02e2bf1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1556.088994] RAX: ffffffffffffffda RBX: 00007f02e578ef60 RCX: 00007f02e567bb19 [ 1556.089005] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1556.089015] RBP: 00007f02e2bf11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1556.089025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1556.089036] R13: 00007fff59e42c0f R14: 00007f02e2bf1300 R15: 0000000000022000 [ 1556.099793] CPU: 1 PID: 11567 Comm: syz-executor.5 Not tainted 5.10.218 #1 [ 1556.100455] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1556.101254] Call Trace: [ 1556.101525] dump_stack+0x107/0x167 [ 1556.101881] should_fail.cold+0x5/0xa [ 1556.102252] ? create_object.isra.0+0x3a/0xa20 [ 1556.102699] should_failslab+0x5/0x20 [ 1556.103069] kmem_cache_alloc+0x5b/0x310 [ 1556.103469] create_object.isra.0+0x3a/0xa20 [ 1556.103901] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1556.104397] kmem_cache_alloc+0x159/0x310 [ 1556.104806] getname_flags.part.0+0x50/0x4f0 [ 1556.105240] getname_flags+0x9a/0xe0 [ 1556.105631] __x64_sys_rename+0x56/0xa0 [ 1556.106030] do_syscall_64+0x33/0x40 [ 1556.106396] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1556.106899] RIP: 0033:0x7fc03a1e8b19 [ 1556.107257] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1556.109000] RSP: 002b:00007fc03773d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1556.109749] RAX: ffffffffffffffda RBX: 00007fc03a2fc020 RCX: 00007fc03a1e8b19 [ 1556.110442] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1556.111119] RBP: 00007fc03773d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1556.111799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1556.112486] R13: 00007fff5b4f0d5f R14: 00007fc03773d300 R15: 0000000000022000 [ 1556.133876] FAULT_INJECTION: forcing a failure. [ 1556.133876] name failslab, interval 1, probability 0, space 0, times 0 [ 1556.135076] CPU: 1 PID: 11570 Comm: syz-executor.0 Not tainted 5.10.218 #1 [ 1556.135747] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1556.136548] Call Trace: [ 1556.136807] dump_stack+0x107/0x167 [ 1556.137159] should_fail.cold+0x5/0xa [ 1556.137541] ? create_object.isra.0+0x3a/0xa20 [ 1556.137977] should_failslab+0x5/0x20 [ 1556.138342] kmem_cache_alloc+0x5b/0x310 [ 1556.138735] create_object.isra.0+0x3a/0xa20 [ 1556.139159] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1556.139647] kmem_cache_alloc+0x159/0x310 [ 1556.140048] getname_flags.part.0+0x50/0x4f0 [ 1556.140467] getname_flags+0x9a/0xe0 [ 1556.140824] __x64_sys_rename+0x56/0xa0 [ 1556.141203] do_syscall_64+0x33/0x40 [ 1556.141576] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1556.142064] RIP: 0033:0x7fed0f341b19 [ 1556.142421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1556.142675] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 11:30:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 2) 11:30:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 2) [ 1556.144162] RSP: 002b:00007fed0c896188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1556.144176] RAX: ffffffffffffffda RBX: 00007fed0f455020 RCX: 00007fed0f341b19 [ 1556.144183] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1556.144201] RBP: 00007fed0c8961d0 R08: 0000000000000000 R09: 0000000000000000 [ 1556.148360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1556.149034] R13: 00007fffbca1454f R14: 00007fed0c896300 R15: 0000000000022000 11:30:53 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1556.184485] FAULT_INJECTION: forcing a failure. [ 1556.184485] name failslab, interval 1, probability 0, space 0, times 0 [ 1556.185646] CPU: 1 PID: 11572 Comm: syz-executor.3 Not tainted 5.10.218 #1 [ 1556.186329] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1556.187124] Call Trace: [ 1556.187395] dump_stack+0x107/0x167 [ 1556.187769] should_fail.cold+0x5/0xa [ 1556.188153] ? create_object.isra.0+0x3a/0xa20 [ 1556.188607] should_failslab+0x5/0x20 [ 1556.188970] kmem_cache_alloc+0x5b/0x310 [ 1556.189356] create_object.isra.0+0x3a/0xa20 [ 1556.189779] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1556.190262] kmem_cache_alloc+0x159/0x310 [ 1556.190661] getname_flags.part.0+0x50/0x4f0 [ 1556.191075] getname_flags+0x9a/0xe0 [ 1556.191426] __x64_sys_rename+0x56/0xa0 [ 1556.191800] do_syscall_64+0x33/0x40 [ 1556.192161] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1556.192643] RIP: 0033:0x7f5dcd1beb19 [ 1556.193002] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1556.194706] RSP: 002b:00007f5dca734188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1556.195419] RAX: ffffffffffffffda RBX: 00007f5dcd2d1f60 RCX: 00007f5dcd1beb19 [ 1556.196091] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1556.196763] RBP: 00007f5dca7341d0 R08: 0000000000000000 R09: 0000000000000000 [ 1556.197437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1556.198113] R13: 00007ffd0ad18b7f R14: 00007f5dca734300 R15: 0000000000022000 [ 1556.228190] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1556.245990] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1556.251225] FAULT_INJECTION: forcing a failure. [ 1556.251225] name failslab, interval 1, probability 0, space 0, times 0 [ 1556.252770] CPU: 1 PID: 11575 Comm: syz-executor.4 Not tainted 5.10.218 #1 [ 1556.253402] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1556.254172] Call Trace: [ 1556.254419] dump_stack+0x107/0x167 [ 1556.254753] should_fail.cold+0x5/0xa [ 1556.255101] ? create_object.isra.0+0x3a/0xa20 [ 1556.255523] should_failslab+0x5/0x20 [ 1556.255878] kmem_cache_alloc+0x5b/0x310 [ 1556.256258] create_object.isra.0+0x3a/0xa20 [ 1556.256659] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1556.257120] kmem_cache_alloc+0x159/0x310 [ 1556.257519] getname_flags.part.0+0x50/0x4f0 [ 1556.257928] getname_flags+0x9a/0xe0 [ 1556.258269] __x64_sys_rename+0x56/0xa0 [ 1556.258629] do_syscall_64+0x33/0x40 [ 1556.258973] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1556.259442] RIP: 0033:0x7f02e567bb19 [ 1556.259797] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1556.261463] RSP: 002b:00007f02e2bf1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1556.262164] RAX: ffffffffffffffda RBX: 00007f02e578ef60 RCX: 00007f02e567bb19 [ 1556.262799] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1556.263438] RBP: 00007f02e2bf11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1556.264084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1556.264731] R13: 00007fff59e42c0f R14: 00007f02e2bf1300 R15: 0000000000022000 [ 1556.292675] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1556.341748] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:31:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 4) 11:31:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 3) 11:31:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:31:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 3) 11:31:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 4) [ 1568.859936] FAULT_INJECTION: forcing a failure. [ 1568.859936] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1568.861043] CPU: 1 PID: 11591 Comm: syz-executor.3 Not tainted 5.10.218 #1 [ 1568.861649] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1568.862354] Call Trace: [ 1568.862590] dump_stack+0x107/0x167 [ 1568.862910] should_fail.cold+0x5/0xa [ 1568.863245] strncpy_from_user+0x34/0x470 [ 1568.863616] getname_flags.part.0+0x95/0x4f0 [ 1568.864000] getname_flags+0x9a/0xe0 [ 1568.864326] __x64_sys_rename+0x56/0xa0 [ 1568.864674] do_syscall_64+0x33/0x40 [ 1568.864999] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1568.865447] RIP: 0033:0x7f5dcd1beb19 [ 1568.865779] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1568.867339] RSP: 002b:00007f5dca734188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1568.868000] RAX: ffffffffffffffda RBX: 00007f5dcd2d1f60 RCX: 00007f5dcd1beb19 [ 1568.868610] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1568.869214] RBP: 00007f5dca7341d0 R08: 0000000000000000 R09: 0000000000000000 [ 1568.869826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1568.870430] R13: 00007ffd0ad18b7f R14: 00007f5dca734300 R15: 0000000000022000 11:31:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 3) 11:31:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 3) 11:31:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 4) [ 1568.892640] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1568.899294] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1568.901284] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1568.903425] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 11:31:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 4) [ 1568.911045] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1568.913009] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1568.919450] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1568.924365] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1568.928449] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1568.931953] FAULT_INJECTION: forcing a failure. [ 1568.931953] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1568.933212] CPU: 1 PID: 11605 Comm: syz-executor.5 Not tainted 5.10.218 #1 [ 1568.933825] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1568.934529] Call Trace: [ 1568.934764] dump_stack+0x107/0x167 [ 1568.935090] should_fail.cold+0x5/0xa [ 1568.935445] strncpy_from_user+0x34/0x470 [ 1568.935827] getname_flags.part.0+0x95/0x4f0 [ 1568.936226] getname_flags+0x9a/0xe0 [ 1568.936567] __x64_sys_rename+0x56/0xa0 [ 1568.936930] do_syscall_64+0x33/0x40 [ 1568.937263] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1568.937728] RIP: 0033:0x7fc03a1e8b19 [ 1568.938071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1568.939641] RSP: 002b:00007fc03775e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1568.940298] RAX: ffffffffffffffda RBX: 00007fc03a2fbf60 RCX: 00007fc03a1e8b19 [ 1568.940912] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1568.941525] RBP: 00007fc03775e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1568.942146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1568.942760] R13: 00007fff5b4f0d5f R14: 00007fc03775e300 R15: 0000000000022000 [ 1568.949495] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1568.950860] FAULT_INJECTION: forcing a failure. [ 1568.950860] name failslab, interval 1, probability 0, space 0, times 0 [ 1568.952060] CPU: 1 PID: 11596 Comm: syz-executor.6 Not tainted 5.10.218 #1 [ 1568.952250] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1568.952639] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1568.952644] Call Trace: [ 1568.952654] dump_stack+0x107/0x167 [ 1568.952664] should_fail.cold+0x5/0xa [ 1568.952678] ? getname_flags.part.0+0x50/0x4f0 [ 1568.952699] should_failslab+0x5/0x20 [ 1568.955956] kmem_cache_alloc+0x5b/0x310 [ 1568.956303] ? strncpy_from_user+0x9e/0x470 [ 1568.956672] getname_flags.part.0+0x50/0x4f0 [ 1568.957046] getname_flags+0x9a/0xe0 [ 1568.957366] __x64_sys_rename+0x65/0xa0 [ 1568.957714] do_syscall_64+0x33/0x40 [ 1568.958001] FAULT_INJECTION: forcing a failure. [ 1568.958001] name failslab, interval 1, probability 0, space 0, times 0 [ 1568.958027] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1568.958043] RIP: 0033:0x7f7c5b06ab19 [ 1568.960370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1568.961919] RSP: 002b:00007f7c585e0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1568.962550] RAX: ffffffffffffffda RBX: 00007f7c5b17df60 RCX: 00007f7c5b06ab19 [ 1568.963147] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1568.963740] RBP: 00007f7c585e01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1568.964331] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1568.964929] R13: 00007ffd64c2920f R14: 00007f7c585e0300 R15: 0000000000022000 [ 1568.965554] CPU: 0 PID: 11593 Comm: syz-executor.1 Not tainted 5.10.218 #1 [ 1568.966573] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1568.967783] Call Trace: [ 1568.968177] dump_stack+0x107/0x167 [ 1568.968714] should_fail.cold+0x5/0xa [ 1568.969280] ? getname_flags.part.0+0x50/0x4f0 [ 1568.969967] should_failslab+0x5/0x20 [ 1568.970530] kmem_cache_alloc+0x5b/0x310 [ 1568.971130] ? strncpy_from_user+0x9e/0x470 [ 1568.971770] getname_flags.part.0+0x50/0x4f0 [ 1568.972425] getname_flags+0x9a/0xe0 [ 1568.972974] __x64_sys_rename+0x65/0xa0 [ 1568.973570] do_syscall_64+0x33/0x40 [ 1568.974128] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1568.974875] RIP: 0033:0x7f3e3bf6bb19 [ 1568.975424] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1568.978127] RSP: 002b:00007f3e394e1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1568.979244] RAX: ffffffffffffffda RBX: 00007f3e3c07ef60 RCX: 00007f3e3bf6bb19 [ 1568.980286] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1568.981320] RBP: 00007f3e394e11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1568.982367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1568.983404] R13: 00007ffd54513d4f R14: 00007f3e394e1300 R15: 0000000000022000 [ 1569.005999] FAULT_INJECTION: forcing a failure. [ 1569.005999] name failslab, interval 1, probability 0, space 0, times 0 [ 1569.006999] CPU: 1 PID: 11606 Comm: syz-executor.2 Not tainted 5.10.218 #1 [ 1569.007444] FAULT_INJECTION: forcing a failure. [ 1569.007444] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1569.007564] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1569.007568] Call Trace: [ 1569.007581] dump_stack+0x107/0x167 [ 1569.007592] should_fail.cold+0x5/0xa [ 1569.007606] ? getname_flags.part.0+0x50/0x4f0 [ 1569.007625] should_failslab+0x5/0x20 [ 1569.007642] kmem_cache_alloc+0x5b/0x310 [ 1569.007660] ? strncpy_from_user+0x9e/0x470 [ 1569.007681] getname_flags.part.0+0x50/0x4f0 [ 1569.007702] getname_flags+0x9a/0xe0 [ 1569.007721] __x64_sys_rename+0x65/0xa0 [ 1569.007736] do_syscall_64+0x33/0x40 [ 1569.007754] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1569.007766] RIP: 0033:0x7f0bf9e7ab19 [ 1569.007784] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1569.007795] RSP: 002b:00007f0bf73f0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1569.007817] RAX: ffffffffffffffda RBX: 00007f0bf9f8df60 RCX: 00007f0bf9e7ab19 [ 1569.007838] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1569.017628] RBP: 00007f0bf73f01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1569.018224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1569.018822] R13: 00007ffd3ed8e5df R14: 00007f0bf73f0300 R15: 0000000000022000 [ 1569.019431] CPU: 0 PID: 11621 Comm: syz-executor.0 Not tainted 5.10.218 #1 [ 1569.020458] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1569.021670] Call Trace: [ 1569.022062] dump_stack+0x107/0x167 [ 1569.022596] should_fail.cold+0x5/0xa [ 1569.023160] strncpy_from_user+0x34/0x470 [ 1569.023773] getname_flags.part.0+0x95/0x4f0 [ 1569.024425] getname_flags+0x9a/0xe0 [ 1569.024976] __x64_sys_rename+0x56/0xa0 [ 1569.025562] do_syscall_64+0x33/0x40 [ 1569.026116] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1569.026866] RIP: 0033:0x7fed0f341b19 [ 1569.027421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1569.030095] RSP: 002b:00007fed0c896188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1569.031205] RAX: ffffffffffffffda RBX: 00007fed0f455020 RCX: 00007fed0f341b19 [ 1569.032255] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1569.033285] RBP: 00007fed0c8961d0 R08: 0000000000000000 R09: 0000000000000000 [ 1569.034329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1569.035371] R13: 00007fffbca1454f R14: 00007fed0c896300 R15: 0000000000022000 [ 1569.046047] FAULT_INJECTION: forcing a failure. [ 1569.046047] name failslab, interval 1, probability 0, space 0, times 0 [ 1569.047820] CPU: 0 PID: 11622 Comm: syz-executor.3 Not tainted 5.10.218 #1 [ 1569.048839] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1569.050051] Call Trace: [ 1569.050438] dump_stack+0x107/0x167 [ 1569.050972] should_fail.cold+0x5/0xa [ 1569.051531] ? getname_flags.part.0+0x50/0x4f0 [ 1569.052200] should_failslab+0x5/0x20 [ 1569.052765] kmem_cache_alloc+0x5b/0x310 [ 1569.053360] ? strncpy_from_user+0x9e/0x470 [ 1569.054004] getname_flags.part.0+0x50/0x4f0 [ 1569.054649] getname_flags+0x9a/0xe0 [ 1569.055169] __x64_sys_rename+0x65/0xa0 [ 1569.055755] do_syscall_64+0x33/0x40 [ 1569.056298] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1569.057021] RIP: 0033:0x7f5dcd1beb19 [ 1569.057576] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1569.060156] RSP: 002b:00007f5dca734188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1569.061273] RAX: ffffffffffffffda RBX: 00007f5dcd2d1f60 RCX: 00007f5dcd1beb19 [ 1569.062322] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1569.063362] RBP: 00007f5dca7341d0 R08: 0000000000000000 R09: 0000000000000000 [ 1569.064401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1569.065444] R13: 00007ffd0ad18b7f R14: 00007f5dca734300 R15: 0000000000022000 [ 1569.072126] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1569.085108] FAULT_INJECTION: forcing a failure. [ 1569.085108] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1569.086297] CPU: 1 PID: 11623 Comm: syz-executor.4 Not tainted 5.10.218 #1 [ 1569.086862] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1569.087533] Call Trace: [ 1569.087763] dump_stack+0x107/0x167 [ 1569.088076] should_fail.cold+0x5/0xa [ 1569.088411] strncpy_from_user+0x34/0x470 [ 1569.088772] getname_flags.part.0+0x95/0x4f0 [ 1569.089136] getname_flags+0x9a/0xe0 [ 1569.089440] __x64_sys_rename+0x56/0xa0 [ 1569.089776] do_syscall_64+0x33/0x40 [ 1569.090075] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1569.090491] RIP: 0033:0x7f02e567bb19 [ 1569.090787] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1569.092270] RSP: 002b:00007f02e2bd0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1569.092889] RAX: ffffffffffffffda RBX: 00007f02e578f020 RCX: 00007f02e567bb19 [ 1569.093469] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1569.094059] RBP: 00007f02e2bd01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1569.094633] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1569.095208] R13: 00007fff59e42c0f R14: 00007f02e2bd0300 R15: 0000000000022000 11:31:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 5) 11:31:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:31:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 5) 11:31:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 4) 11:31:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 5) 11:31:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 5) [ 1569.119683] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1569.141321] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem 11:31:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 4) [ 1569.175344] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1569.183006] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1569.184071] FAULT_INJECTION: forcing a failure. [ 1569.184071] name failslab, interval 1, probability 0, space 0, times 0 [ 1569.185002] CPU: 1 PID: 11632 Comm: syz-executor.3 Not tainted 5.10.218 #1 [ 1569.185569] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1569.186263] Call Trace: [ 1569.186488] dump_stack+0x107/0x167 [ 1569.186788] should_fail.cold+0x5/0xa [ 1569.187101] ? getname_flags.part.0+0x50/0x4f0 [ 1569.187477] should_failslab+0x5/0x20 [ 1569.187789] kmem_cache_alloc+0x5b/0x310 [ 1569.188122] ? strncpy_from_user+0x9e/0x470 [ 1569.188478] getname_flags.part.0+0x50/0x4f0 [ 1569.188839] getname_flags+0x9a/0xe0 [ 1569.189147] __x64_sys_rename+0x65/0xa0 [ 1569.189477] do_syscall_64+0x33/0x40 [ 1569.189796] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1569.190216] RIP: 0033:0x7f5dcd1beb19 [ 1569.190526] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1569.192011] RSP: 002b:00007f5dca734188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1569.192633] RAX: ffffffffffffffda RBX: 00007f5dcd2d1f60 RCX: 00007f5dcd1beb19 [ 1569.193214] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1569.193807] RBP: 00007f5dca7341d0 R08: 0000000000000000 R09: 0000000000000000 [ 1569.194396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1569.194984] R13: 00007ffd0ad18b7f R14: 00007f5dca734300 R15: 0000000000022000 [ 1569.208035] FAULT_INJECTION: forcing a failure. [ 1569.208035] name failslab, interval 1, probability 0, space 0, times 0 [ 1569.209791] CPU: 0 PID: 11638 Comm: syz-executor.6 Not tainted 5.10.218 #1 [ 1569.210803] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1569.212012] Call Trace: [ 1569.212407] dump_stack+0x107/0x167 [ 1569.212949] should_fail.cold+0x5/0xa [ 1569.213513] ? create_object.isra.0+0x3a/0xa20 [ 1569.214196] should_failslab+0x5/0x20 [ 1569.214763] kmem_cache_alloc+0x5b/0x310 [ 1569.215364] create_object.isra.0+0x3a/0xa20 [ 1569.216010] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1569.216754] kmem_cache_alloc+0x159/0x310 [ 1569.217369] getname_flags.part.0+0x50/0x4f0 [ 1569.218022] getname_flags+0x9a/0xe0 [ 1569.218573] __x64_sys_rename+0x65/0xa0 [ 1569.219156] do_syscall_64+0x33/0x40 [ 1569.219702] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1569.220451] RIP: 0033:0x7f7c5b06ab19 [ 1569.221002] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1569.223672] RSP: 002b:00007f7c585bf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1569.224785] RAX: ffffffffffffffda RBX: 00007f7c5b17e020 RCX: 00007f7c5b06ab19 [ 1569.225831] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1569.226868] RBP: 00007f7c585bf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1569.227906] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1569.228954] R13: 00007ffd64c2920f R14: 00007f7c585bf300 R15: 0000000000022000 11:31:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 4) [ 1569.248010] FAULT_INJECTION: forcing a failure. [ 1569.248010] name failslab, interval 1, probability 0, space 0, times 0 [ 1569.249177] CPU: 1 PID: 11640 Comm: syz-executor.2 Not tainted 5.10.218 #1 [ 1569.249758] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1569.250459] Call Trace: [ 1569.250679] dump_stack+0x107/0x167 [ 1569.250976] should_fail.cold+0x5/0xa [ 1569.251288] ? create_object.isra.0+0x3a/0xa20 [ 1569.251660] should_failslab+0x5/0x20 [ 1569.251974] kmem_cache_alloc+0x5b/0x310 [ 1569.252309] create_object.isra.0+0x3a/0xa20 [ 1569.252670] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1569.253087] kmem_cache_alloc+0x159/0x310 [ 1569.253435] ? strncpy_from_user+0x9e/0x470 [ 1569.253798] getname_flags.part.0+0x50/0x4f0 [ 1569.254159] getname_flags+0x9a/0xe0 [ 1569.254466] __x64_sys_rename+0x65/0xa0 [ 1569.254796] do_syscall_64+0x33/0x40 [ 1569.255101] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1569.255514] RIP: 0033:0x7f0bf9e7ab19 [ 1569.255816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1569.257297] RSP: 002b:00007f0bf73cf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1569.257921] RAX: ffffffffffffffda RBX: 00007f0bf9f8e020 RCX: 00007f0bf9e7ab19 [ 1569.258498] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1569.259083] RBP: 00007f0bf73cf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1569.259656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1569.260242] R13: 00007ffd3ed8e5df R14: 00007f0bf73cf300 R15: 0000000000022000 [ 1569.275290] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1569.290245] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 11:31:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 6) 11:31:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 6) [ 1569.303413] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1569.309503] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1569.314314] FAULT_INJECTION: forcing a failure. [ 1569.314314] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1569.315613] CPU: 1 PID: 11645 Comm: syz-executor.1 Not tainted 5.10.218 #1 [ 1569.316176] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1569.316847] Call Trace: [ 1569.317068] dump_stack+0x107/0x167 [ 1569.317371] should_fail.cold+0x5/0xa [ 1569.317697] __alloc_pages_nodemask+0x182/0x600 [ 1569.318075] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1569.318578] ? kmem_cache_alloc+0x301/0x310 [ 1569.318935] alloc_pages_current+0x187/0x280 [ 1569.319299] allocate_slab+0x26f/0x380 [ 1569.319623] ___slab_alloc+0x470/0x700 [ 1569.319949] ? getname_flags.part.0+0x50/0x4f0 [ 1569.320324] ? __virt_addr_valid+0x170/0x5c0 [ 1569.320684] ? getname_flags.part.0+0x50/0x4f0 [ 1569.321056] ? kmem_cache_alloc+0x301/0x310 [ 1569.321412] ? getname_flags.part.0+0x50/0x4f0 [ 1569.321793] kmem_cache_alloc+0x301/0x310 [ 1569.322134] getname_flags.part.0+0x50/0x4f0 [ 1569.322492] getname_flags+0x9a/0xe0 [ 1569.322800] __x64_sys_rename+0x65/0xa0 [ 1569.323129] do_syscall_64+0x33/0x40 [ 1569.323435] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1569.323848] RIP: 0033:0x7f3e3bf6bb19 [ 1569.324159] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1569.325647] RSP: 002b:00007f3e394e1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1569.326269] RAX: ffffffffffffffda RBX: 00007f3e3c07ef60 RCX: 00007f3e3bf6bb19 [ 1569.326845] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1569.327421] RBP: 00007f3e394e11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1569.327995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1569.328570] R13: 00007ffd54513d4f R14: 00007f3e394e1300 R15: 0000000000022000 [ 1569.350192] FAULT_INJECTION: forcing a failure. [ 1569.350192] name failslab, interval 1, probability 0, space 0, times 0 [ 1569.351148] CPU: 1 PID: 11655 Comm: syz-executor.5 Not tainted 5.10.218 #1 [ 1569.351711] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1569.352380] Call Trace: [ 1569.352602] dump_stack+0x107/0x167 [ 1569.352901] should_fail.cold+0x5/0xa [ 1569.353214] ? getname_flags.part.0+0x50/0x4f0 [ 1569.353590] should_failslab+0x5/0x20 [ 1569.353910] kmem_cache_alloc+0x5b/0x310 [ 1569.354244] ? strncpy_from_user+0x9e/0x470 [ 1569.354612] getname_flags.part.0+0x50/0x4f0 [ 1569.354975] getname_flags+0x9a/0xe0 [ 1569.355280] __x64_sys_rename+0x65/0xa0 [ 1569.355606] do_syscall_64+0x33/0x40 [ 1569.355913] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1569.356328] RIP: 0033:0x7fc03a1e8b19 [ 1569.356633] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1569.358127] RSP: 002b:00007fc03773d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1569.358748] RAX: ffffffffffffffda RBX: 00007fc03a2fc020 RCX: 00007fc03a1e8b19 [ 1569.359321] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1569.359897] RBP: 00007fc03773d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1569.360478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1569.361057] R13: 00007fff5b4f0d5f R14: 00007fc03773d300 R15: 0000000000022000 [ 1569.365641] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1569.366319] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1569.375288] FAULT_INJECTION: forcing a failure. [ 1569.375288] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1569.376257] CPU: 1 PID: 11653 Comm: syz-executor.3 Not tainted 5.10.218 #1 [ 1569.376822] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1569.377493] Call Trace: [ 1569.377716] dump_stack+0x107/0x167 [ 1569.378012] should_fail.cold+0x5/0xa [ 1569.378322] strncpy_from_user+0x34/0x470 [ 1569.378660] getname_flags.part.0+0x95/0x4f0 [ 1569.379021] getname_flags+0x9a/0xe0 [ 1569.379324] __x64_sys_rename+0x65/0xa0 [ 1569.379649] do_syscall_64+0x33/0x40 [ 1569.379946] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1569.380353] RIP: 0033:0x7f5dcd1beb19 [ 1569.380657] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1569.382110] RSP: 002b:00007f5dca734188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1569.382725] RAX: ffffffffffffffda RBX: 00007f5dcd2d1f60 RCX: 00007f5dcd1beb19 [ 1569.383304] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1569.383880] RBP: 00007f5dca7341d0 R08: 0000000000000000 R09: 0000000000000000 [ 1569.384460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1569.385036] R13: 00007ffd0ad18b7f R14: 00007f5dca734300 R15: 0000000000022000 [ 1569.387544] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 11:31:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 6) [ 1569.401265] FAULT_INJECTION: forcing a failure. [ 1569.401265] name failslab, interval 1, probability 0, space 0, times 0 [ 1569.402243] CPU: 1 PID: 11650 Comm: syz-executor.4 Not tainted 5.10.218 #1 [ 1569.402807] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1569.403484] Call Trace: [ 1569.403712] dump_stack+0x107/0x167 [ 1569.403918] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1569.404035] should_fail.cold+0x5/0xa [ 1569.405494] ? getname_flags.part.0+0x50/0x4f0 [ 1569.405893] should_failslab+0x5/0x20 [ 1569.406221] kmem_cache_alloc+0x5b/0x310 [ 1569.406564] ? strncpy_from_user+0x9e/0x470 [ 1569.406933] getname_flags.part.0+0x50/0x4f0 [ 1569.407307] getname_flags+0x9a/0xe0 [ 1569.407625] __x64_sys_rename+0x65/0xa0 [ 1569.407965] do_syscall_64+0x33/0x40 [ 1569.408285] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1569.408715] RIP: 0033:0x7f02e567bb19 [ 1569.409039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1569.410549] RSP: 002b:00007f02e2bf1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1569.411172] RAX: ffffffffffffffda RBX: 00007f02e578ef60 RCX: 00007f02e567bb19 [ 1569.411751] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1569.412328] RBP: 00007f02e2bf11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1569.412905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1569.413490] R13: 00007fff59e42c0f R14: 00007f02e2bf1300 R15: 0000000000022000 [ 1569.431752] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 11:31:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:31:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 6) [ 1569.454027] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 11:31:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 7) [ 1569.476297] FAULT_INJECTION: forcing a failure. [ 1569.476297] name failslab, interval 1, probability 0, space 0, times 0 [ 1569.477283] CPU: 1 PID: 11669 Comm: syz-executor.0 Not tainted 5.10.218 #1 [ 1569.477854] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1569.478515] Call Trace: [ 1569.478734] dump_stack+0x107/0x167 [ 1569.479033] should_fail.cold+0x5/0xa [ 1569.479346] ? getname_flags.part.0+0x50/0x4f0 [ 1569.479722] should_failslab+0x5/0x20 [ 1569.480035] kmem_cache_alloc+0x5b/0x310 [ 1569.480370] ? strncpy_from_user+0x9e/0x470 [ 1569.480736] getname_flags.part.0+0x50/0x4f0 [ 1569.481093] getname_flags+0x9a/0xe0 [ 1569.481398] __x64_sys_rename+0x65/0xa0 [ 1569.481724] do_syscall_64+0x33/0x40 [ 1569.482030] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1569.482442] RIP: 0033:0x7fed0f341b19 [ 1569.482747] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1569.484230] RSP: 002b:00007fed0c896188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1569.484846] RAX: ffffffffffffffda RBX: 00007fed0f455020 RCX: 00007fed0f341b19 [ 1569.485423] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1569.486018] RBP: 00007fed0c8961d0 R08: 0000000000000000 R09: 0000000000000000 [ 1569.486598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1569.487177] R13: 00007fffbca1454f R14: 00007fed0c896300 R15: 0000000000022000 [ 1569.489423] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1569.492130] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1569.499042] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1569.521355] FAULT_INJECTION: forcing a failure. [ 1569.521355] name failslab, interval 1, probability 0, space 0, times 0 [ 1569.522622] CPU: 1 PID: 11665 Comm: syz-executor.2 Not tainted 5.10.218 #1 [ 1569.523189] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1569.523859] Call Trace: [ 1569.524075] dump_stack+0x107/0x167 [ 1569.524377] should_fail.cold+0x5/0xa [ 1569.524687] ? create_object.isra.0+0x3a/0xa20 [ 1569.525055] should_failslab+0x5/0x20 [ 1569.525370] kmem_cache_alloc+0x5b/0x310 [ 1569.525711] create_object.isra.0+0x3a/0xa20 [ 1569.526069] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1569.526480] kmem_cache_alloc+0x159/0x310 [ 1569.526825] getname_flags.part.0+0x50/0x4f0 [ 1569.527185] getname_flags+0x9a/0xe0 [ 1569.527492] __x64_sys_rename+0x65/0xa0 [ 1569.527821] do_syscall_64+0x33/0x40 [ 1569.528125] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1569.528540] RIP: 0033:0x7f0bf9e7ab19 [ 1569.528846] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1569.530368] RSP: 002b:00007f0bf73f0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1569.530988] RAX: ffffffffffffffda RBX: 00007f0bf9f8df60 RCX: 00007f0bf9e7ab19 [ 1569.531567] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1569.532137] RBP: 00007f0bf73f01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1569.532714] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1569.533292] R13: 00007ffd3ed8e5df R14: 00007f0bf73f0300 R15: 0000000000022000 [ 1569.542036] FAULT_INJECTION: forcing a failure. [ 1569.542036] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1569.543404] CPU: 1 PID: 11663 Comm: syz-executor.6 Not tainted 5.10.218 #1 [ 1569.543969] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1569.544637] Call Trace: [ 1569.544861] dump_stack+0x107/0x167 [ 1569.545174] should_fail.cold+0x5/0xa [ 1569.545503] strncpy_from_user+0x34/0x470 [ 1569.545866] getname_flags.part.0+0x95/0x4f0 [ 1569.546248] getname_flags+0x9a/0xe0 [ 1569.546562] __x64_sys_rename+0x65/0xa0 [ 1569.546899] do_syscall_64+0x33/0x40 [ 1569.547222] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1569.547654] RIP: 0033:0x7f7c5b06ab19 [ 1569.547967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1569.549477] RSP: 002b:00007f7c585e0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1569.550131] RAX: ffffffffffffffda RBX: 00007f7c5b17df60 RCX: 00007f7c5b06ab19 [ 1569.550730] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1569.551316] RBP: 00007f7c585e01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1569.551905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1569.552502] R13: 00007ffd64c2920f R14: 00007f7c585e0300 R15: 0000000000022000 [ 1569.577876] FAULT_INJECTION: forcing a failure. [ 1569.577876] name failslab, interval 1, probability 0, space 0, times 0 [ 1569.579895] CPU: 0 PID: 11672 Comm: syz-executor.3 Not tainted 5.10.218 #1 [ 1569.580909] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1569.582132] Call Trace: [ 1569.582530] dump_stack+0x107/0x167 [ 1569.583064] should_fail.cold+0x5/0xa [ 1569.583631] ? __d_alloc+0x2a/0x990 [ 1569.584170] should_failslab+0x5/0x20 [ 1569.584737] kmem_cache_alloc+0x5b/0x310 [ 1569.585333] ? __d_lookup+0x3bf/0x760 [ 1569.585907] __d_alloc+0x2a/0x990 [ 1569.586426] d_alloc+0x46/0x1c0 [ 1569.586893] __lookup_hash+0xcc/0x190 [ 1569.587461] do_renameat2+0x500/0xbb0 [ 1569.588009] ? __ia32_sys_link+0x80/0x80 [ 1569.588611] ? __check_object_size+0x319/0x440 [ 1569.589266] ? strncpy_from_user+0x9e/0x470 [ 1569.589912] ? getname_flags.part.0+0x1dd/0x4f0 [ 1569.590606] __x64_sys_rename+0x7d/0xa0 [ 1569.591161] do_syscall_64+0x33/0x40 [ 1569.591715] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1569.592440] RIP: 0033:0x7f5dcd1beb19 [ 1569.592990] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1569.595557] RSP: 002b:00007f5dca734188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1569.596676] RAX: ffffffffffffffda RBX: 00007f5dcd2d1f60 RCX: 00007f5dcd1beb19 [ 1569.597723] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1569.598760] RBP: 00007f5dca7341d0 R08: 0000000000000000 R09: 0000000000000000 [ 1569.599792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1569.600831] R13: 00007ffd0ad18b7f R14: 00007f5dca734300 R15: 0000000000022000 [ 1569.616087] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1569.619336] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1569.645809] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1569.655938] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1569.668113] FAULT_INJECTION: forcing a failure. [ 1569.668113] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1569.670212] CPU: 0 PID: 11679 Comm: syz-executor.1 Not tainted 5.10.218 #1 [ 1569.671219] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1569.672423] Call Trace: [ 1569.672812] dump_stack+0x107/0x167 [ 1569.673344] should_fail.cold+0x5/0xa [ 1569.673927] strncpy_from_user+0x34/0x470 [ 1569.674536] getname_flags.part.0+0x95/0x4f0 [ 1569.675183] getname_flags+0x9a/0xe0 [ 1569.675729] __x64_sys_rename+0x65/0xa0 [ 1569.676309] do_syscall_64+0x33/0x40 [ 1569.676855] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1569.677604] RIP: 0033:0x7f3e3bf6bb19 [ 1569.678155] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1569.680797] RSP: 002b:00007f3e394e1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1569.681911] RAX: ffffffffffffffda RBX: 00007f3e3c07ef60 RCX: 00007f3e3bf6bb19 [ 1569.682951] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1569.683980] RBP: 00007f3e394e11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1569.685012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1569.686054] R13: 00007ffd54513d4f R14: 00007f3e394e1300 R15: 0000000000022000 11:31:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 5) 11:31:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 7) 11:31:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 8) 11:31:20 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 7) 11:31:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 5) 11:31:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 5) 11:31:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 7) 11:31:20 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1582.721835] FAULT_INJECTION: forcing a failure. [ 1582.721835] name failslab, interval 1, probability 0, space 0, times 0 [ 1582.723676] CPU: 0 PID: 11690 Comm: syz-executor.3 Not tainted 5.10.218 #1 [ 1582.724709] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1582.725951] Call Trace: [ 1582.726361] dump_stack+0x107/0x167 [ 1582.726919] should_fail.cold+0x5/0xa [ 1582.727525] ? create_object.isra.0+0x3a/0xa20 [ 1582.728231] should_failslab+0x5/0x20 [ 1582.728811] kmem_cache_alloc+0x5b/0x310 [ 1582.729429] create_object.isra.0+0x3a/0xa20 [ 1582.730106] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1582.730881] kmem_cache_alloc+0x159/0x310 [ 1582.731517] __d_alloc+0x2a/0x990 [ 1582.732053] d_alloc+0x46/0x1c0 [ 1582.732564] __lookup_hash+0xcc/0x190 [ 1582.733108] do_renameat2+0x500/0xbb0 [ 1582.733692] ? __ia32_sys_link+0x80/0x80 [ 1582.734306] ? __check_object_size+0x319/0x440 [ 1582.735007] ? strncpy_from_user+0x9e/0x470 [ 1582.735668] ? getname_flags.part.0+0x1dd/0x4f0 [ 1582.736390] __x64_sys_rename+0x7d/0xa0 [ 1582.736995] do_syscall_64+0x33/0x40 [ 1582.737559] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1582.738330] RIP: 0033:0x7f5dcd1beb19 [ 1582.738898] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1582.741668] RSP: 002b:00007f5dca734188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1582.742821] RAX: ffffffffffffffda RBX: 00007f5dcd2d1f60 RCX: 00007f5dcd1beb19 [ 1582.743895] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1582.744937] RBP: 00007f5dca7341d0 R08: 0000000000000000 R09: 0000000000000000 [ 1582.746030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1582.746271] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1582.747091] R13: 00007ffd0ad18b7f R14: 00007f5dca734300 R15: 0000000000022000 [ 1582.764805] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1582.765628] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1582.765889] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1582.774268] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1582.782583] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1582.783285] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1582.786780] FAULT_INJECTION: forcing a failure. [ 1582.786780] name failslab, interval 1, probability 0, space 0, times 0 [ 1582.788178] CPU: 1 PID: 11702 Comm: syz-executor.2 Not tainted 5.10.218 #1 [ 1582.788776] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1582.789478] Call Trace: [ 1582.789712] dump_stack+0x107/0x167 [ 1582.790032] should_fail.cold+0x5/0xa [ 1582.790343] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1582.791008] ? jbd2__journal_start+0x190/0x7e0 [ 1582.791389] should_failslab+0x5/0x20 [ 1582.791713] kmem_cache_alloc+0x5b/0x310 [ 1582.792054] jbd2__journal_start+0x190/0x7e0 [ 1582.792221] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1582.792442] __ext4_journal_start_sb+0x214/0x390 [ 1582.794100] ext4_rename+0x96d/0x2bc0 [ 1582.794428] ? ext4_tmpfile+0x490/0x490 [ 1582.794769] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1582.795209] ? lock_acquire+0x197/0x470 [ 1582.795541] ? vfs_rename+0xdc8/0x17e0 [ 1582.795884] ? lockref_get+0x11/0x50 [ 1582.796205] ? find_held_lock+0x2c/0x110 [ 1582.796566] ? down_write+0xe0/0x160 [ 1582.796884] ext4_rename2+0x1af/0x240 [ 1582.797209] vfs_rename+0xecf/0x17e0 [ 1582.797527] ? vfs_unlink+0x700/0x700 [ 1582.797864] ? lookup_dcache+0x65/0x130 [ 1582.798210] do_renameat2+0xa92/0xbb0 [ 1582.798534] ? __ia32_sys_link+0x80/0x80 [ 1582.798880] ? __check_object_size+0x319/0x440 [ 1582.799272] ? strncpy_from_user+0x9e/0x470 [ 1582.799643] ? getname_flags.part.0+0x1dd/0x4f0 [ 1582.800040] __x64_sys_rename+0x7d/0xa0 [ 1582.800375] do_syscall_64+0x33/0x40 [ 1582.800701] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1582.801147] RIP: 0033:0x7f0bf9e7ab19 [ 1582.801463] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1582.801907] FAULT_INJECTION: forcing a failure. [ 1582.801907] name failslab, interval 1, probability 0, space 0, times 0 [ 1582.803019] RSP: 002b:00007f0bf73f0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1582.803032] RAX: ffffffffffffffda RBX: 00007f0bf9f8df60 RCX: 00007f0bf9e7ab19 [ 1582.803039] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1582.803046] RBP: 00007f0bf73f01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1582.803052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1582.803058] R13: 00007ffd3ed8e5df R14: 00007f0bf73f0300 R15: 0000000000022000 [ 1582.806705] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1582.807866] CPU: 0 PID: 11701 Comm: syz-executor.4 Not tainted 5.10.218 #1 [ 1582.809499] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1582.810433] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1582.810440] Call Trace: [ 1582.810477] dump_stack+0x107/0x167 [ 1582.816717] should_fail.cold+0x5/0xa [ 1582.816998] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1582.817309] ? create_object.isra.0+0x3a/0xa20 [ 1582.818698] should_failslab+0x5/0x20 [ 1582.819285] kmem_cache_alloc+0x5b/0x310 [ 1582.819920] create_object.isra.0+0x3a/0xa20 [ 1582.820594] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1582.821300] FAULT_INJECTION: forcing a failure. [ 1582.821300] name failslab, interval 1, probability 0, space 0, times 0 [ 1582.821372] kmem_cache_alloc+0x159/0x310 [ 1582.822883] ? strncpy_from_user+0x9e/0x470 [ 1582.823544] getname_flags.part.0+0x50/0x4f0 [ 1582.824217] getname_flags+0x9a/0xe0 [ 1582.824785] __x64_sys_rename+0x65/0xa0 [ 1582.825393] do_syscall_64+0x33/0x40 [ 1582.825974] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1582.826751] RIP: 0033:0x7f02e567bb19 [ 1582.827328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1582.830117] RSP: 002b:00007f02e2bf1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1582.831281] RAX: ffffffffffffffda RBX: 00007f02e578ef60 RCX: 00007f02e567bb19 [ 1582.832364] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1582.833448] RBP: 00007f02e2bf11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1582.834538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1582.835624] R13: 00007fff59e42c0f R14: 00007f02e2bf1300 R15: 0000000000022000 [ 1582.836728] CPU: 1 PID: 11725 Comm: syz-executor.0 Not tainted 5.10.218 #1 [ 1582.837321] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1582.838005] Call Trace: [ 1582.838226] dump_stack+0x107/0x167 [ 1582.838533] should_fail.cold+0x5/0xa [ 1582.838855] ? create_object.isra.0+0x3a/0xa20 [ 1582.839252] should_failslab+0x5/0x20 [ 1582.839565] kmem_cache_alloc+0x5b/0x310 [ 1582.839906] create_object.isra.0+0x3a/0xa20 [ 1582.840260] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1582.840692] kmem_cache_alloc+0x159/0x310 [ 1582.841038] ? strncpy_from_user+0x9e/0x470 [ 1582.841407] getname_flags.part.0+0x50/0x4f0 [ 1582.841771] getname_flags+0x9a/0xe0 [ 1582.842090] __x64_sys_rename+0x65/0xa0 [ 1582.842413] do_syscall_64+0x33/0x40 [ 1582.842723] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1582.843139] RIP: 0033:0x7fed0f341b19 [ 1582.843448] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1582.844936] RSP: 002b:00007fed0c896188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1582.845560] RAX: ffffffffffffffda RBX: 00007fed0f455020 RCX: 00007fed0f341b19 [ 1582.846152] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1582.846722] RBP: 00007fed0c8961d0 R08: 0000000000000000 R09: 0000000000000000 [ 1582.847295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1582.847867] R13: 00007fffbca1454f R14: 00007fed0c896300 R15: 0000000000022000 [ 1582.849135] FAULT_INJECTION: forcing a failure. [ 1582.849135] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1582.850268] CPU: 1 PID: 11693 Comm: syz-executor.6 Not tainted 5.10.218 #1 [ 1582.850824] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1582.851510] Call Trace: [ 1582.851724] dump_stack+0x107/0x167 [ 1582.852025] should_fail.cold+0x5/0xa [ 1582.852339] _copy_to_user+0x2e/0x180 [ 1582.852671] simple_read_from_buffer+0xcc/0x160 [ 1582.853050] proc_fail_nth_read+0x198/0x230 [ 1582.853413] ? proc_sessionid_read+0x230/0x230 [ 1582.853789] ? security_file_permission+0x24e/0x570 [ 1582.854208] ? perf_trace_initcall_start+0xf1/0x380 [ 1582.854616] ? proc_sessionid_read+0x230/0x230 [ 1582.855000] vfs_read+0x228/0x580 [ 1582.855284] ksys_read+0x12d/0x260 [ 1582.855585] ? vfs_write+0xa70/0xa70 [ 1582.855889] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1582.856320] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1582.856737] do_syscall_64+0x33/0x40 11:31:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 9) [ 1582.857050] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1582.857717] RIP: 0033:0x7f7c5b01d69c [ 1582.858023] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1582.859500] RSP: 002b:00007f7c585e0170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1582.860113] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f7c5b01d69c [ 1582.860683] RDX: 000000000000000f RSI: 00007f7c585e01e0 RDI: 0000000000000004 [ 1582.861260] RBP: 00007f7c585e01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1582.861851] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1582.862434] R13: 00007ffd64c2920f R14: 00007f7c585e0300 R15: 0000000000022000 [ 1582.866363] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1582.873491] FAULT_INJECTION: forcing a failure. [ 1582.873491] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1582.874620] CPU: 1 PID: 11703 Comm: syz-executor.1 Not tainted 5.10.218 #1 [ 1582.874951] FAULT_INJECTION: forcing a failure. [ 1582.874951] name failslab, interval 1, probability 0, space 0, times 0 [ 1582.875191] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1582.875219] Call Trace: [ 1582.877790] dump_stack+0x107/0x167 [ 1582.878104] should_fail.cold+0x5/0xa [ 1582.878419] _copy_to_user+0x2e/0x180 [ 1582.878748] simple_read_from_buffer+0xcc/0x160 [ 1582.879135] proc_fail_nth_read+0x198/0x230 [ 1582.879494] ? proc_sessionid_read+0x230/0x230 [ 1582.879882] ? security_file_permission+0x24e/0x570 [ 1582.880307] ? perf_trace_initcall_start+0xf1/0x380 [ 1582.880728] ? proc_sessionid_read+0x230/0x230 [ 1582.881097] vfs_read+0x228/0x580 [ 1582.881381] ksys_read+0x12d/0x260 [ 1582.881675] ? vfs_write+0xa70/0xa70 [ 1582.881988] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1582.882416] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1582.882838] do_syscall_64+0x33/0x40 [ 1582.883137] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1582.883546] RIP: 0033:0x7f3e3bf1e69c [ 1582.883857] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1582.885330] RSP: 002b:00007f3e394e1170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1582.885977] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f3e3bf1e69c [ 1582.886562] RDX: 000000000000000f RSI: 00007f3e394e11e0 RDI: 0000000000000004 [ 1582.887154] RBP: 00007f3e394e11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1582.887744] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1582.888338] R13: 00007ffd54513d4f R14: 00007f3e394e1300 R15: 0000000000022000 [ 1582.888949] CPU: 0 PID: 11699 Comm: syz-executor.5 Not tainted 5.10.218 #1 [ 1582.890018] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1582.891288] Call Trace: [ 1582.891704] dump_stack+0x107/0x167 [ 1582.892266] should_fail.cold+0x5/0xa [ 1582.892852] ? create_object.isra.0+0x3a/0xa20 [ 1582.893556] should_failslab+0x5/0x20 [ 1582.894152] kmem_cache_alloc+0x5b/0x310 [ 1582.894756] create_object.isra.0+0x3a/0xa20 [ 1582.895435] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1582.896184] kmem_cache_alloc+0x159/0x310 [ 1582.896823] ? strncpy_from_user+0x9e/0x470 [ 1582.897462] getname_flags.part.0+0x50/0x4f0 [ 1582.898149] getname_flags+0x9a/0xe0 [ 1582.898702] __x64_sys_rename+0x65/0xa0 [ 1582.899316] do_syscall_64+0x33/0x40 [ 1582.899867] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1582.900655] RIP: 0033:0x7fc03a1e8b19 [ 1582.901204] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1582.904040] RSP: 002b:00007fc03775e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1582.905157] RAX: ffffffffffffffda RBX: 00007fc03a2fbf60 RCX: 00007fc03a1e8b19 [ 1582.906249] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1582.907335] RBP: 00007fc03775e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1582.908420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1582.909503] R13: 00007fff5b4f0d5f R14: 00007fc03775e300 R15: 0000000000022000 11:31:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 8) [ 1582.985117] FAULT_INJECTION: forcing a failure. [ 1582.985117] name failslab, interval 1, probability 0, space 0, times 0 [ 1582.986260] CPU: 1 PID: 11730 Comm: syz-executor.3 Not tainted 5.10.218 #1 [ 1582.986832] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1582.987494] Call Trace: [ 1582.987720] dump_stack+0x107/0x167 [ 1582.988019] should_fail.cold+0x5/0xa [ 1582.988337] ? jbd2__journal_start+0x190/0x7e0 [ 1582.988715] should_failslab+0x5/0x20 [ 1582.989033] kmem_cache_alloc+0x5b/0x310 [ 1582.989360] ? ext4_dx_find_entry+0x600/0x600 [ 1582.989748] jbd2__journal_start+0x190/0x7e0 [ 1582.990121] __ext4_journal_start_sb+0x214/0x390 [ 1582.990517] ext4_rename+0x96d/0x2bc0 [ 1582.990833] ? ext4_tmpfile+0x490/0x490 [ 1582.991168] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1582.991592] ? lock_acquire+0x197/0x470 [ 1582.991921] ? vfs_rename+0xe15/0x17e0 [ 1582.992239] ? lockref_get+0x11/0x50 [ 1582.992545] ? find_held_lock+0x2c/0x110 [ 1582.992879] ? down_write_nested+0xe4/0x160 [ 1582.993241] ext4_rename2+0x1af/0x240 [ 1582.993556] vfs_rename+0xecf/0x17e0 [ 1582.993880] ? vfs_unlink+0x700/0x700 [ 1582.994189] ? _raw_spin_unlock+0x1a/0x30 [ 1582.994545] do_renameat2+0xa92/0xbb0 [ 1582.994863] ? __ia32_sys_link+0x80/0x80 [ 1582.995200] ? __check_object_size+0x319/0x440 [ 1582.995568] ? strncpy_from_user+0x9e/0x470 [ 1582.995938] ? getname_flags.part.0+0x1dd/0x4f0 [ 1582.996312] __x64_sys_rename+0x7d/0xa0 [ 1582.996649] do_syscall_64+0x33/0x40 [ 1582.996951] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1582.997367] RIP: 0033:0x7f5dcd1beb19 [ 1582.997668] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1582.999188] RSP: 002b:00007f5dca734188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1582.999793] RAX: ffffffffffffffda RBX: 00007f5dcd2d1f60 RCX: 00007f5dcd1beb19 [ 1583.000393] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1583.000975] RBP: 00007f5dca7341d0 R08: 0000000000000000 R09: 0000000000000000 [ 1583.001555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1583.002154] R13: 00007ffd0ad18b7f R14: 00007f5dca734300 R15: 0000000000022000 [ 1583.044219] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1583.068216] FAULT_INJECTION: forcing a failure. [ 1583.068216] name failslab, interval 1, probability 0, space 0, times 0 [ 1583.070035] CPU: 0 PID: 11733 Comm: syz-executor.2 Not tainted 5.10.218 #1 [ 1583.071064] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1583.072257] Call Trace: [ 1583.072659] dump_stack+0x107/0x167 [ 1583.073197] should_fail.cold+0x5/0xa [ 1583.073786] ? jbd2__journal_start+0x190/0x7e0 [ 1583.074453] should_failslab+0x5/0x20 [ 1583.075025] kmem_cache_alloc+0x5b/0x310 [ 1583.075606] ? ext4_dx_find_entry+0x600/0x600 [ 1583.076278] jbd2__journal_start+0x190/0x7e0 [ 1583.076919] __ext4_journal_start_sb+0x214/0x390 [ 1583.077646] ext4_rename+0x96d/0x2bc0 [ 1583.078216] ? ext4_tmpfile+0x490/0x490 [ 1583.078811] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1583.079579] ? lock_acquire+0x197/0x470 [ 1583.080168] ? vfs_rename+0xdc8/0x17e0 [ 1583.080753] ? lockref_get+0x11/0x50 [ 1583.081306] ? find_held_lock+0x2c/0x110 [ 1583.081927] ? down_write+0xe0/0x160 [ 1583.082493] ext4_rename2+0x1af/0x240 [ 1583.083063] vfs_rename+0xecf/0x17e0 [ 1583.083632] ? vfs_unlink+0x700/0x700 [ 1583.084214] ? lookup_dcache+0x65/0x130 [ 1583.084812] do_renameat2+0xa92/0xbb0 [ 1583.085380] ? __ia32_sys_link+0x80/0x80 [ 1583.085998] ? __check_object_size+0x319/0x440 [ 1583.086673] ? strncpy_from_user+0x9e/0x470 [ 1583.087318] ? getname_flags.part.0+0x1dd/0x4f0 [ 1583.088007] __x64_sys_rename+0x7d/0xa0 [ 1583.088599] do_syscall_64+0x33/0x40 [ 1583.089143] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1583.089913] RIP: 0033:0x7f0bf9e7ab19 [ 1583.090458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1583.093153] RSP: 002b:00007f0bf73f0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1583.094260] RAX: ffffffffffffffda RBX: 00007f0bf9f8df60 RCX: 00007f0bf9e7ab19 [ 1583.095326] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1583.096376] RBP: 00007f0bf73f01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1583.097405] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1583.098465] R13: 00007ffd3ed8e5df R14: 00007f0bf73f0300 R15: 0000000000022000 11:31:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 6) 11:31:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 6) 11:31:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 9) 11:31:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 6) 11:31:32 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:31:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:31:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:31:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 10) [ 1594.844436] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1594.855491] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1594.860138] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1594.864126] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1594.879192] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1594.883751] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1594.886321] FAULT_INJECTION: forcing a failure. [ 1594.886321] name failslab, interval 1, probability 0, space 0, times 0 [ 1594.888113] CPU: 1 PID: 11761 Comm: syz-executor.3 Not tainted 5.10.218 #1 [ 1594.889078] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1594.890237] Call Trace: [ 1594.890617] dump_stack+0x107/0x167 [ 1594.891133] should_fail.cold+0x5/0xa [ 1594.891661] ? create_object.isra.0+0x3a/0xa20 [ 1594.892285] should_failslab+0x5/0x20 [ 1594.892806] kmem_cache_alloc+0x5b/0x310 [ 1594.893365] ? __ext4_find_entry+0x9f8/0xfc0 [ 1594.893975] create_object.isra.0+0x3a/0xa20 [ 1594.894573] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1594.895315] kmem_cache_alloc+0x159/0x310 [ 1594.895880] ? ext4_dx_find_entry+0x600/0x600 [ 1594.896538] jbd2__journal_start+0x190/0x7e0 [ 1594.897187] __ext4_journal_start_sb+0x214/0x390 [ 1594.897840] ext4_rename+0x96d/0x2bc0 [ 1594.898407] ? ext4_tmpfile+0x490/0x490 [ 1594.898989] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1594.899759] ? lock_acquire+0x197/0x470 [ 1594.900333] ? vfs_rename+0xe15/0x17e0 [ 1594.900914] ? lockref_get+0x11/0x50 [ 1594.901454] ? find_held_lock+0x2c/0x110 [ 1594.902065] ? down_write_nested+0xe4/0x160 [ 1594.902699] ext4_rename2+0x1af/0x240 [ 1594.903256] vfs_rename+0xecf/0x17e0 [ 1594.903810] ? vfs_unlink+0x700/0x700 [ 1594.904370] ? _raw_spin_unlock+0x1a/0x30 [ 1594.904985] do_renameat2+0xa92/0xbb0 [ 1594.905547] ? __ia32_sys_link+0x80/0x80 [ 1594.906188] ? __check_object_size+0x319/0x440 [ 1594.906861] ? strncpy_from_user+0x9e/0x470 [ 1594.907494] ? getname_flags.part.0+0x1dd/0x4f0 [ 1594.908182] __x64_sys_rename+0x7d/0xa0 [ 1594.908762] do_syscall_64+0x33/0x40 [ 1594.909303] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1594.910049] RIP: 0033:0x7f5dcd1beb19 [ 1594.910593] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1594.913236] RSP: 002b:00007f5dca734188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1594.914343] RAX: ffffffffffffffda RBX: 00007f5dcd2d1f60 RCX: 00007f5dcd1beb19 [ 1594.915373] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1594.916401] RBP: 00007f5dca7341d0 R08: 0000000000000000 R09: 0000000000000000 [ 1594.917429] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1594.918462] R13: 00007ffd0ad18b7f R14: 00007f5dca734300 R15: 0000000000022000 [ 1594.927656] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1594.928455] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1594.929597] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1594.934214] FAULT_INJECTION: forcing a failure. [ 1594.934214] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1594.935304] CPU: 0 PID: 11739 Comm: syz-executor.5 Not tainted 5.10.218 #1 [ 1594.935898] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1594.936606] Call Trace: [ 1594.936840] dump_stack+0x107/0x167 [ 1594.937158] should_fail.cold+0x5/0xa [ 1594.937490] strncpy_from_user+0x34/0x470 [ 1594.937851] getname_flags.part.0+0x95/0x4f0 [ 1594.938233] getname_flags+0x9a/0xe0 [ 1594.938553] __x64_sys_rename+0x65/0xa0 [ 1594.938890] do_syscall_64+0x33/0x40 [ 1594.939213] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1594.939652] RIP: 0033:0x7fc03a1e8b19 [ 1594.939972] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1594.940767] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1594.941520] RSP: 002b:00007fc03775e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1594.941533] RAX: ffffffffffffffda RBX: 00007fc03a2fbf60 RCX: 00007fc03a1e8b19 [ 1594.941550] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1594.944550] RBP: 00007fc03775e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1594.945159] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1594.945771] R13: 00007fff5b4f0d5f R14: 00007fc03775e300 R15: 0000000000022000 [ 1594.946030] FAULT_INJECTION: forcing a failure. [ 1594.946030] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1594.947281] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1594.948086] CPU: 1 PID: 11771 Comm: syz-executor.0 Not tainted 5.10.218 #1 [ 1594.948097] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1594.948102] Call Trace: [ 1594.948124] dump_stack+0x107/0x167 [ 1594.948142] should_fail.cold+0x5/0xa [ 1594.948165] strncpy_from_user+0x34/0x470 [ 1594.948188] getname_flags.part.0+0x95/0x4f0 [ 1594.948208] getname_flags+0x9a/0xe0 [ 1594.948227] __x64_sys_rename+0x65/0xa0 [ 1594.948243] do_syscall_64+0x33/0x40 [ 1594.948260] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1594.948271] RIP: 0033:0x7fed0f341b19 [ 1594.948288] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1594.948298] RSP: 002b:00007fed0c896188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1594.948317] RAX: ffffffffffffffda RBX: 00007fed0f455020 RCX: 00007fed0f341b19 [ 1594.948328] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1594.948345] RBP: 00007fed0c8961d0 R08: 0000000000000000 R09: 0000000000000000 [ 1594.963233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1594.964261] R13: 00007fffbca1454f R14: 00007fed0c896300 R15: 0000000000022000 [ 1594.966299] FAULT_INJECTION: forcing a failure. [ 1594.966299] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1594.968120] CPU: 1 PID: 11741 Comm: syz-executor.4 Not tainted 5.10.218 #1 [ 1594.969125] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1594.970323] Call Trace: [ 1594.970719] dump_stack+0x107/0x167 [ 1594.971259] should_fail.cold+0x5/0xa [ 1594.971826] strncpy_from_user+0x34/0x470 [ 1594.972441] getname_flags.part.0+0x95/0x4f0 [ 1594.973099] getname_flags+0x9a/0xe0 [ 1594.973658] __x64_sys_rename+0x65/0xa0 [ 1594.974255] do_syscall_64+0x33/0x40 [ 1594.974794] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1594.975550] RIP: 0033:0x7f02e567bb19 [ 1594.976110] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1594.978692] RSP: 002b:00007f02e2bf1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1594.979814] RAX: ffffffffffffffda RBX: 00007f02e578ef60 RCX: 00007f02e567bb19 [ 1594.980861] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1594.981907] RBP: 00007f02e2bf11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1594.982959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1594.984009] R13: 00007fff59e42c0f R14: 00007f02e2bf1300 R15: 0000000000022000 [ 1594.988331] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1594.996482] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1595.008969] FAULT_INJECTION: forcing a failure. [ 1595.008969] name failslab, interval 1, probability 0, space 0, times 0 [ 1595.010270] CPU: 0 PID: 11777 Comm: syz-executor.2 Not tainted 5.10.218 #1 [ 1595.010868] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1595.011575] Call Trace: [ 1595.011807] dump_stack+0x107/0x167 [ 1595.012121] should_fail.cold+0x5/0xa [ 1595.012452] ? jbd2__journal_start+0x190/0x7e0 [ 1595.012853] should_failslab+0x5/0x20 [ 1595.013190] kmem_cache_alloc+0x5b/0x310 [ 1595.013544] jbd2__journal_start+0x190/0x7e0 [ 1595.013940] __ext4_journal_start_sb+0x214/0x390 [ 1595.014350] ext4_evict_inode+0x8f4/0x1a60 [ 1595.014728] ? ext4_da_write_begin+0xd40/0xd40 [ 1595.015132] ? rwlock_bug.part.0+0x90/0x90 [ 1595.015504] ? ext4_da_write_begin+0xd40/0xd40 [ 1595.015916] evict+0x284/0x6b0 [ 1595.016197] iput.part.0+0x4b9/0x6d0 [ 1595.016520] ? trace_event_raw_event_ext4_fc_track_inode+0x320/0x320 [ 1595.017077] iput+0x58/0x70 [ 1595.017340] dentry_unlink_inode+0x2b4/0x3e0 [ 1595.017723] __dentry_kill+0x36f/0x5c0 [ 1595.018070] ? dput+0x35/0xcd0 [ 1595.018351] dput+0x6f4/0xcd0 [ 1595.018627] do_renameat2+0x6f6/0xbb0 [ 1595.018966] ? __ia32_sys_link+0x80/0x80 [ 1595.019320] ? __check_object_size+0x319/0x440 [ 1595.019729] ? strncpy_from_user+0x9e/0x470 [ 1595.020102] ? getname_flags.part.0+0x1dd/0x4f0 [ 1595.020508] __x64_sys_rename+0x7d/0xa0 [ 1595.020855] do_syscall_64+0x33/0x40 [ 1595.021174] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1595.021617] RIP: 0033:0x7f0bf9e7ab19 [ 1595.021947] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1595.023504] RSP: 002b:00007f0bf73cf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1595.024145] RAX: ffffffffffffffda RBX: 00007f0bf9f8e020 RCX: 00007f0bf9e7ab19 [ 1595.024755] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1595.025369] RBP: 00007f0bf73cf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1595.025981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1595.026581] R13: 00007ffd3ed8e5df R14: 00007f0bf73cf300 R15: 0000000000022000 [ 1595.027510] EXT4-fs error (device sda) in ext4_evict_inode:257: Out of memory 11:31:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 7) 11:31:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 10) [ 1595.075329] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 11:31:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 11) [ 1595.101329] FAULT_INJECTION: forcing a failure. [ 1595.101329] name failslab, interval 1, probability 0, space 0, times 0 [ 1595.102401] CPU: 0 PID: 11780 Comm: syz-executor.2 Not tainted 5.10.218 #1 [ 1595.102978] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1595.103674] Call Trace: [ 1595.103903] dump_stack+0x107/0x167 [ 1595.104212] should_fail.cold+0x5/0xa [ 1595.104538] ? create_object.isra.0+0x3a/0xa20 [ 1595.104923] should_failslab+0x5/0x20 [ 1595.105245] kmem_cache_alloc+0x5b/0x310 [ 1595.105590] create_object.isra.0+0x3a/0xa20 [ 1595.105966] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1595.106392] kmem_cache_alloc+0x159/0x310 [ 1595.106743] jbd2__journal_start+0x190/0x7e0 [ 1595.107124] __ext4_journal_start_sb+0x214/0x390 [ 1595.107524] ext4_evict_inode+0x8f4/0x1a60 [ 1595.107889] ? ext4_da_write_begin+0xd40/0xd40 [ 1595.108277] ? rwlock_bug.part.0+0x90/0x90 [ 1595.108644] ? ext4_da_write_begin+0xd40/0xd40 [ 1595.109029] evict+0x284/0x6b0 [ 1595.109304] iput.part.0+0x4b9/0x6d0 [ 1595.109624] ? trace_event_raw_event_ext4_fc_track_inode+0x320/0x320 [ 1595.110171] iput+0x58/0x70 [ 1595.110427] dentry_unlink_inode+0x2b4/0x3e0 [ 1595.110801] __dentry_kill+0x36f/0x5c0 [ 1595.111132] ? dput+0x35/0xcd0 [ 1595.111405] dput+0x6f4/0xcd0 [ 1595.111675] do_renameat2+0x6f6/0xbb0 [ 1595.112000] ? __ia32_sys_link+0x80/0x80 [ 1595.112341] ? __check_object_size+0x319/0x440 [ 1595.112731] ? strncpy_from_user+0x9e/0x470 [ 1595.113094] ? getname_flags.part.0+0x1dd/0x4f0 [ 1595.113493] __x64_sys_rename+0x7d/0xa0 [ 1595.113827] do_syscall_64+0x33/0x40 [ 1595.114150] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1595.114581] RIP: 0033:0x7f0bf9e7ab19 [ 1595.114893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1595.116407] RSP: 002b:00007f0bf73f0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1595.117039] RAX: ffffffffffffffda RBX: 00007f0bf9f8df60 RCX: 00007f0bf9e7ab19 [ 1595.117631] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1595.118227] RBP: 00007f0bf73f01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1595.118822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1595.119408] R13: 00007ffd3ed8e5df R14: 00007f0bf73f0300 R15: 0000000000022000 11:31:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 7) 11:31:32 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:31:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r0, 0x0, 0x20000010) pread64(r0, &(0x7f0000000280)=""/239, 0xef, 0x7) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') mount$9p_unix(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000080)='mnt/encrypted_dir\x00', &(0x7f0000000140), 0x4011, &(0x7f0000000380)={'trans=unix,', {[{@access_any}, {@dfltgid}, {@loose}], [{@fsmagic={'fsmagic', 0x3d, 0x400}}, {@subj_user}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) 11:31:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 11) [ 1595.182724] FAULT_INJECTION: forcing a failure. [ 1595.182724] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1595.184638] CPU: 1 PID: 11783 Comm: syz-executor.3 Not tainted 5.10.218 #1 [ 1595.185642] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1595.186796] Call Trace: [ 1595.187186] dump_stack+0x107/0x167 [ 1595.187706] should_fail.cold+0x5/0xa [ 1595.188264] _copy_to_user+0x2e/0x180 [ 1595.188803] simple_read_from_buffer+0xcc/0x160 11:31:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 7) [ 1595.189478] proc_fail_nth_read+0x198/0x230 [ 1595.190213] ? proc_sessionid_read+0x230/0x230 [ 1595.190876] ? security_file_permission+0x24e/0x570 [ 1595.191594] ? perf_trace_initcall_start+0xf1/0x380 [ 1595.192158] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1595.192317] ? proc_sessionid_read+0x230/0x230 [ 1595.193444] vfs_read+0x228/0x580 [ 1595.193960] ksys_read+0x12d/0x260 [ 1595.194475] ? vfs_write+0xa70/0xa70 [ 1595.195024] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1595.195752] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1595.196497] do_syscall_64+0x33/0x40 [ 1595.197025] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1595.197762] RIP: 0033:0x7f5dcd17169c [ 1595.198292] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1595.200892] RSP: 002b:00007f5dca734170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1595.201986] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5dcd17169c [ 1595.203007] RDX: 000000000000000f RSI: 00007f5dca7341e0 RDI: 0000000000000005 [ 1595.204031] RBP: 00007f5dca7341d0 R08: 0000000000000000 R09: 0000000000000000 [ 1595.205048] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1595.206076] R13: 00007ffd0ad18b7f R14: 00007f5dca734300 R15: 0000000000022000 11:31:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1595.254294] FAULT_INJECTION: forcing a failure. [ 1595.254294] name failslab, interval 1, probability 0, space 0, times 0 [ 1595.255482] CPU: 0 PID: 11791 Comm: syz-executor.0 Not tainted 5.10.218 #1 [ 1595.256041] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1595.256702] Call Trace: [ 1595.256926] dump_stack+0x107/0x167 [ 1595.257221] should_fail.cold+0x5/0xa [ 1595.257536] ? __d_alloc+0x2a/0x990 [ 1595.257842] should_failslab+0x5/0x20 [ 1595.258160] kmem_cache_alloc+0x5b/0x310 [ 1595.258489] ? __d_lookup+0x3bf/0x760 [ 1595.258802] __d_alloc+0x2a/0x990 [ 1595.259097] d_alloc+0x46/0x1c0 [ 1595.259375] __lookup_hash+0xcc/0x190 [ 1595.259687] do_renameat2+0x500/0xbb0 [ 1595.260002] ? __ia32_sys_link+0x80/0x80 [ 1595.260337] ? __check_object_size+0x319/0x440 [ 1595.260718] ? strncpy_from_user+0x9e/0x470 [ 1595.261074] ? getname_flags.part.0+0x1dd/0x4f0 [ 1595.261457] __x64_sys_rename+0x7d/0xa0 [ 1595.261780] do_syscall_64+0x33/0x40 [ 1595.262091] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1595.262509] RIP: 0033:0x7fed0f341b19 [ 1595.262812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1595.264289] RSP: 002b:00007fed0c8b7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1595.264902] RAX: ffffffffffffffda RBX: 00007fed0f454f60 RCX: 00007fed0f341b19 [ 1595.265471] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1595.266046] RBP: 00007fed0c8b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 1595.266621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1595.267199] R13: 00007fffbca1454f R14: 00007fed0c8b7300 R15: 0000000000022000 [ 1595.284588] FAULT_INJECTION: forcing a failure. [ 1595.284588] name failslab, interval 1, probability 0, space 0, times 0 [ 1595.287101] CPU: 1 PID: 11787 Comm: syz-executor.2 Not tainted 5.10.218 #1 [ 1595.288117] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1595.289325] Call Trace: [ 1595.289724] dump_stack+0x107/0x167 [ 1595.290279] should_fail.cold+0x5/0xa 11:31:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1595.290852] ? create_object.isra.0+0x3a/0xa20 [ 1595.291689] should_failslab+0x5/0x20 [ 1595.292261] kmem_cache_alloc+0x5b/0x310 [ 1595.292867] ? __kasan_slab_free+0x122/0x160 [ 1595.293519] create_object.isra.0+0x3a/0xa20 [ 1595.294175] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1595.294928] __kmalloc+0x16e/0x390 [ 1595.295449] ? __ext4_journal_start_sb+0x1db/0x390 [ 1595.296182] ext4_ext_remove_space+0x15af/0x3d90 [ 1595.296886] ? ext4_es_remove_extent+0x2f2/0x450 [ 1595.297600] ? do_raw_read_unlock+0x70/0x70 [ 1595.298239] ? ext4_da_release_space+0x21/0x480 [ 1595.298929] ? ext4_ext_index_trans_blocks+0x170/0x170 [ 1595.299700] ? ext4_es_lookup_extent+0xaa0/0xaa0 [ 1595.300406] ? down_write+0xe0/0x160 [ 1595.300961] ? down_write_killable+0x180/0x180 [ 1595.301630] ext4_ext_truncate+0x1ea/0x250 [ 1595.302270] ext4_truncate+0xc38/0x1160 [ 1595.302858] ? ext4_punch_hole+0x1070/0x1070 [ 1595.303517] ? __ext4_journal_start_sb+0x214/0x390 [ 1595.304232] ? __ext4_journal_start_sb+0x1db/0x390 [ 1595.304966] ext4_evict_inode+0xae0/0x1a60 [ 1595.305590] ? ext4_da_write_begin+0xd40/0xd40 [ 1595.306273] ? rwlock_bug.part.0+0x90/0x90 [ 1595.306894] ? ext4_da_write_begin+0xd40/0xd40 [ 1595.307576] evict+0x284/0x6b0 [ 1595.308051] iput.part.0+0x4b9/0x6d0 [ 1595.308609] ? trace_event_raw_event_ext4_fc_track_inode+0x320/0x320 [ 1595.309564] iput+0x58/0x70 [ 1595.310019] dentry_unlink_inode+0x2b4/0x3e0 [ 1595.310671] __dentry_kill+0x36f/0x5c0 [ 1595.311261] ? dput+0x35/0xcd0 [ 1595.311726] dput+0x6f4/0xcd0 [ 1595.312215] do_renameat2+0x6f6/0xbb0 [ 1595.312781] ? __ia32_sys_link+0x80/0x80 [ 1595.313387] ? __check_object_size+0x319/0x440 [ 1595.314067] ? strncpy_from_user+0x9e/0x470 [ 1595.314717] ? getname_flags.part.0+0x1dd/0x4f0 [ 1595.315392] __x64_sys_rename+0x7d/0xa0 [ 1595.315973] do_syscall_64+0x33/0x40 [ 1595.316500] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1595.317249] RIP: 0033:0x7f0bf9e7ab19 [ 1595.317775] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1595.320358] RSP: 002b:00007f0bf73f0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1595.321443] RAX: ffffffffffffffda RBX: 00007f0bf9f8df60 RCX: 00007f0bf9e7ab19 [ 1595.322487] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1595.323519] RBP: 00007f0bf73f01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1595.324554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1595.325589] R13: 00007ffd3ed8e5df R14: 00007f0bf73f0300 R15: 0000000000022000 [ 1595.331079] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1595.366088] FAULT_INJECTION: forcing a failure. [ 1595.366088] name failslab, interval 1, probability 0, space 0, times 0 [ 1595.367053] CPU: 0 PID: 11798 Comm: syz-executor.5 Not tainted 5.10.218 #1 [ 1595.367609] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1595.368292] Call Trace: [ 1595.368529] dump_stack+0x107/0x167 [ 1595.368852] should_fail.cold+0x5/0xa [ 1595.369182] ? jbd2__journal_start+0x190/0x7e0 [ 1595.369573] should_failslab+0x5/0x20 [ 1595.369887] kmem_cache_alloc+0x5b/0x310 [ 1595.370224] ? ext4_dx_find_entry+0x600/0x600 [ 1595.370594] jbd2__journal_start+0x190/0x7e0 [ 1595.370964] __ext4_journal_start_sb+0x214/0x390 [ 1595.371351] ext4_rename+0x96d/0x2bc0 [ 1595.371671] ? ext4_tmpfile+0x490/0x490 [ 1595.372000] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1595.372425] ? lock_acquire+0x197/0x470 [ 1595.372750] ? vfs_rename+0xdc8/0x17e0 [ 1595.373076] ? lockref_get+0x11/0x50 [ 1595.373378] ? find_held_lock+0x2c/0x110 [ 1595.373720] ? down_write+0xe0/0x160 [ 1595.374037] ext4_rename2+0x1af/0x240 [ 1595.374350] vfs_rename+0xecf/0x17e0 [ 1595.374662] ? vfs_unlink+0x700/0x700 [ 1595.374979] ? lookup_dcache+0x65/0x130 [ 1595.375306] do_renameat2+0xa92/0xbb0 [ 1595.375622] ? __ia32_sys_link+0x80/0x80 [ 1595.375954] ? __check_object_size+0x319/0x440 [ 1595.376330] ? strncpy_from_user+0x9e/0x470 [ 1595.376683] ? getname_flags.part.0+0x1dd/0x4f0 [ 1595.377073] __x64_sys_rename+0x7d/0xa0 [ 1595.377393] do_syscall_64+0x33/0x40 [ 1595.377696] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1595.378120] RIP: 0033:0x7fc03a1e8b19 [ 1595.378424] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1595.379904] RSP: 002b:00007fc03773d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1595.380520] RAX: ffffffffffffffda RBX: 00007fc03a2fc020 RCX: 00007fc03a1e8b19 [ 1595.381093] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1595.381664] RBP: 00007fc03773d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1595.382242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1595.382816] R13: 00007fff5b4f0d5f R14: 00007fc03773d300 R15: 0000000000022000 [ 1595.390162] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1595.420010] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1595.423578] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1595.427802] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1595.432897] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1595.442147] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1595.455314] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1595.458092] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1595.469659] FAULT_INJECTION: forcing a failure. [ 1595.469659] name failslab, interval 1, probability 0, space 0, times 0 [ 1595.470832] CPU: 0 PID: 11816 Comm: syz-executor.4 Not tainted 5.10.218 #1 [ 1595.471387] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1595.472070] Call Trace: [ 1595.472306] dump_stack+0x107/0x167 [ 1595.472623] should_fail.cold+0x5/0xa [ 1595.472955] ? jbd2__journal_start+0x190/0x7e0 [ 1595.473344] should_failslab+0x5/0x20 [ 1595.473656] kmem_cache_alloc+0x5b/0x310 [ 1595.473997] jbd2__journal_start+0x190/0x7e0 [ 1595.474356] __ext4_journal_start_sb+0x214/0x390 [ 1595.474743] ext4_rename+0x96d/0x2bc0 [ 1595.475049] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1595.475707] ? ext4_tmpfile+0x490/0x490 [ 1595.476046] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1595.476480] ? lock_acquire+0x197/0x470 [ 1595.476818] ? vfs_rename+0xdc8/0x17e0 [ 1595.477140] ? lockref_get+0x11/0x50 [ 1595.477442] ? find_held_lock+0x2c/0x110 [ 1595.477781] ? down_write+0xe0/0x160 [ 1595.478097] ext4_rename2+0x1af/0x240 [ 1595.478409] vfs_rename+0xecf/0x17e0 [ 1595.478717] ? vfs_unlink+0x700/0x700 [ 1595.479033] ? lookup_dcache+0x65/0x130 [ 1595.479358] do_renameat2+0xa92/0xbb0 [ 1595.479673] ? __ia32_sys_link+0x80/0x80 [ 1595.480001] ? __check_object_size+0x319/0x440 [ 1595.480377] ? strncpy_from_user+0x9e/0x470 [ 1595.480725] ? getname_flags.part.0+0x1dd/0x4f0 [ 1595.481108] __x64_sys_rename+0x7d/0xa0 [ 1595.481434] do_syscall_64+0x33/0x40 [ 1595.481738] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1595.482168] RIP: 0033:0x7f02e567bb19 [ 1595.482473] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1595.483932] RSP: 002b:00007f02e2bd0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1595.484547] RAX: ffffffffffffffda RBX: 00007f02e578f020 RCX: 00007f02e567bb19 [ 1595.485127] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1595.485703] RBP: 00007f02e2bd01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1595.486282] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1595.486856] R13: 00007fff59e42c0f R14: 00007f02e2bd0300 R15: 0000000000022000 [ 1595.499048] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1595.534467] 9pnet: p9_fd_create_unix (11807): problem connecting socket: ./mnt: -111 [ 1595.580993] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.6'. 11:31:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 8) 11:31:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x1) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:31:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./mnt\x00', 0x101000, 0x80) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='mnt/encrypted_dir\x00', &(0x7f0000000140), 0x84840, &(0x7f0000000280)={'trans=unix,', {[{@cache_mmap}], [{@obj_user}, {@euid_eq={'euid', 0x3d, r0}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:31:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 8) 11:31:46 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) openat(r0, &(0x7f0000000000)='./mnt\x00', 0x400802, 0x72) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) unlinkat(r2, &(0x7f00000000c0)='mnt/encrypted_dir/file0\x00', 0x0) chmod(&(0x7f0000000040)='mnt/encrypted_dir/file0\x00', 0x104) 11:31:46 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:31:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 8) 11:31:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 12) [ 1609.491037] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1609.500348] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1609.524209] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1609.525905] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1609.527625] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1609.529585] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1609.537810] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1609.539298] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 1609.551383] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1609.555232] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1609.558233] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1609.559237] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1609.565981] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1609.584905] FAULT_INJECTION: forcing a failure. [ 1609.584905] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1609.587175] CPU: 0 PID: 11861 Comm: syz-executor.0 Not tainted 5.10.218 #1 [ 1609.588182] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1609.589374] Call Trace: [ 1609.589773] dump_stack+0x107/0x167 [ 1609.590319] should_fail.cold+0x5/0xa [ 1609.590884] _copy_from_user+0x2e/0x1b0 [ 1609.591467] kstrtouint_from_user+0xbd/0x220 [ 1609.592110] ? kstrtou8_from_user+0x210/0x210 [ 1609.592783] ? lock_acquire+0x197/0x470 [ 1609.593366] ? ksys_write+0x12d/0x260 [ 1609.593934] proc_fail_nth_write+0x78/0x220 [ 1609.594569] ? proc_task_getattr+0x1f0/0x1f0 [ 1609.595205] ? __fget_files+0x296/0x4c0 [ 1609.595792] ? proc_task_getattr+0x1f0/0x1f0 [ 1609.596432] vfs_write+0x29a/0xa70 [ 1609.596962] ksys_write+0x12d/0x260 [ 1609.597491] ? __ia32_sys_read+0xb0/0xb0 [ 1609.598095] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1609.598857] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1609.599604] do_syscall_64+0x33/0x40 [ 1609.600155] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1609.600918] RIP: 0033:0x7fed0f2f45ff [ 1609.601471] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 1609.604120] RSP: 002b:00007fed0c896170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1609.604923] FAULT_INJECTION: forcing a failure. [ 1609.604923] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1609.605226] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fed0f2f45ff [ 1609.605246] RDX: 0000000000000001 RSI: 00007fed0c8961e0 RDI: 0000000000000007 [ 1609.608927] RBP: 00007fed0c8961d0 R08: 0000000000000000 R09: 0000000000000000 [ 1609.609966] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 1609.611006] R13: 00007fffbca1454f R14: 00007fed0c896300 R15: 0000000000022000 [ 1609.612065] CPU: 1 PID: 11841 Comm: syz-executor.4 Not tainted 5.10.218 #1 [ 1609.613070] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1609.614263] Call Trace: [ 1609.614655] dump_stack+0x107/0x167 [ 1609.615186] should_fail.cold+0x5/0xa [ 1609.615745] _copy_from_user+0x2e/0x1b0 [ 1609.616325] kstrtouint_from_user+0xbd/0x220 [ 1609.616962] ? kstrtou8_from_user+0x210/0x210 [ 1609.617616] ? lock_acquire+0x197/0x470 [ 1609.618199] ? ksys_write+0x12d/0x260 [ 1609.618758] proc_fail_nth_write+0x78/0x220 [ 1609.619385] ? proc_task_getattr+0x1f0/0x1f0 [ 1609.620025] ? __fget_files+0x296/0x4c0 [ 1609.620609] ? proc_task_getattr+0x1f0/0x1f0 [ 1609.621241] vfs_write+0x29a/0xa70 [ 1609.621766] ksys_write+0x12d/0x260 [ 1609.622299] ? __ia32_sys_read+0xb0/0xb0 [ 1609.622889] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1609.623641] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1609.624383] do_syscall_64+0x33/0x40 [ 1609.624930] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1609.625663] RIP: 0033:0x7f02e562e5ff [ 1609.626207] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 1609.628812] RSP: 002b:00007f02e2bf1170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1609.629901] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f02e562e5ff [ 1609.630923] RDX: 0000000000000001 RSI: 00007f02e2bf11e0 RDI: 0000000000000004 [ 1609.631939] RBP: 00007f02e2bf11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1609.632955] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 1609.633969] R13: 00007fff59e42c0f R14: 00007f02e2bf1300 R15: 0000000000022000 [ 1609.653376] FAULT_INJECTION: forcing a failure. [ 1609.653376] name failslab, interval 1, probability 0, space 0, times 0 [ 1609.655347] CPU: 0 PID: 11838 Comm: syz-executor.2 Not tainted 5.10.218 #1 [ 1609.656375] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1609.657593] Call Trace: [ 1609.657994] dump_stack+0x107/0x167 11:31:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000600), 0x9}, 0x0, 0x0, 0x100, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x30, 0x10, 0x1, 0xa, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x11, 0x3ffc, 0x0, 0x1, [@generic="487fec864b245e0f3f9be149f8"]}]}, 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x82280, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f00000000c0)={@private0={0xfc, 0x0, '\x00', 0x1}, 0x2f}) [ 1609.658560] should_fail.cold+0x5/0xa [ 1609.659325] ? create_object.isra.0+0x3a/0xa20 [ 1609.660005] should_failslab+0x5/0x20 [ 1609.660566] kmem_cache_alloc+0x5b/0x310 [ 1609.661166] create_object.isra.0+0x3a/0xa20 [ 1609.661811] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1609.662565] kmem_cache_alloc+0x159/0x310 [ 1609.663177] ? jbd2_journal_put_journal_head+0x38a/0x560 [ 1609.663970] insert_revoke_hash+0x28/0x270 [ 1609.664601] jbd2_journal_revoke+0x2bb/0x570 [ 1609.665253] __ext4_forget+0x218/0x3e0 [ 1609.665827] ext4_free_blocks+0x1b8c/0x2200 [ 1609.666479] ? ext4_mb_new_blocks+0x45b0/0x45b0 [ 1609.667181] ? ext4_ext_get_access.constprop.0.isra.0+0x80/0x80 [ 1609.668044] ? __ext4_journal_ensure_credits+0x263/0x2e0 [ 1609.668860] ext4_ext_remove_space+0x1ef7/0x3d90 [ 1609.669588] ? ext4_ext_index_trans_blocks+0x170/0x170 [ 1609.670391] ? ext4_es_lookup_extent+0xaa0/0xaa0 [ 1609.671080] ? down_write+0xe0/0x160 [ 1609.671638] ? down_write_killable+0x180/0x180 [ 1609.672298] ext4_ext_truncate+0x1ea/0x250 [ 1609.672943] ext4_truncate+0xc38/0x1160 [ 1609.673521] ? ext4_punch_hole+0x1070/0x1070 [ 1609.674207] ? __ext4_journal_start_sb+0x214/0x390 [ 1609.674923] ? __ext4_journal_start_sb+0x1db/0x390 [ 1609.675665] ext4_evict_inode+0xae0/0x1a60 [ 1609.676291] ? ext4_da_write_begin+0xd40/0xd40 [ 1609.676975] ? rwlock_bug.part.0+0x90/0x90 [ 1609.677594] ? ext4_da_write_begin+0xd40/0xd40 [ 1609.678281] evict+0x284/0x6b0 [ 1609.678754] iput.part.0+0x4b9/0x6d0 [ 1609.679316] ? trace_event_raw_event_ext4_fc_track_inode+0x320/0x320 [ 1609.680244] iput+0x58/0x70 [ 1609.680699] dentry_unlink_inode+0x2b4/0x3e0 [ 1609.681344] __dentry_kill+0x36f/0x5c0 [ 1609.681936] ? dput+0x35/0xcd0 [ 1609.682420] dput+0x6f4/0xcd0 [ 1609.682898] do_renameat2+0x6f6/0xbb0 [ 1609.683462] ? __ia32_sys_link+0x80/0x80 [ 1609.684072] ? __check_object_size+0x319/0x440 [ 1609.684740] ? strncpy_from_user+0x9e/0x470 [ 1609.685388] ? getname_flags.part.0+0x1dd/0x4f0 [ 1609.686068] __x64_sys_rename+0x7d/0xa0 [ 1609.686673] do_syscall_64+0x33/0x40 [ 1609.687221] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1609.687980] RIP: 0033:0x7f0bf9e7ab19 [ 1609.688516] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1609.691223] RSP: 002b:00007f0bf73f0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1609.692325] RAX: ffffffffffffffda RBX: 00007f0bf9f8df60 RCX: 00007f0bf9e7ab19 [ 1609.693385] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1609.694457] RBP: 00007f0bf73f01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1609.695511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1609.696562] R13: 00007ffd3ed8e5df R14: 00007f0bf73f0300 R15: 0000000000022000 11:31:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1609.735286] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 11:31:47 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1609.757232] FAULT_INJECTION: forcing a failure. [ 1609.757232] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1609.759110] CPU: 0 PID: 11834 Comm: syz-executor.5 Not tainted 5.10.218 #1 [ 1609.760109] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1609.761292] Call Trace: [ 1609.761684] dump_stack+0x107/0x167 [ 1609.762235] should_fail.cold+0x5/0xa [ 1609.762797] _copy_from_user+0x2e/0x1b0 [ 1609.763376] kstrtouint_from_user+0xbd/0x220 [ 1609.764022] ? kstrtou8_from_user+0x210/0x210 [ 1609.764686] ? lock_acquire+0x197/0x470 [ 1609.765273] ? ksys_write+0x12d/0x260 [ 1609.765832] proc_fail_nth_write+0x78/0x220 [ 1609.766473] ? proc_task_getattr+0x1f0/0x1f0 [ 1609.767102] ? __fget_files+0x296/0x4c0 [ 1609.767698] ? proc_task_getattr+0x1f0/0x1f0 [ 1609.768343] vfs_write+0x29a/0xa70 [ 1609.768872] ksys_write+0x12d/0x260 [ 1609.769398] ? __ia32_sys_read+0xb0/0xb0 [ 1609.769997] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1609.770759] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1609.771510] do_syscall_64+0x33/0x40 [ 1609.772046] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1609.772788] RIP: 0033:0x7fc03a19b5ff [ 1609.773334] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 1609.775973] RSP: 002b:00007fc03775e170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1609.777059] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fc03a19b5ff [ 1609.778115] RDX: 0000000000000001 RSI: 00007fc03775e1e0 RDI: 0000000000000004 [ 1609.779170] RBP: 00007fc03775e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1609.780229] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 1609.781284] R13: 00007fff5b4f0d5f R14: 00007fc03775e300 R15: 0000000000022000 11:31:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1609.840264] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1609.862164] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 11:31:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./mnt\x00', 0x1) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = fork() wait4(r1, 0x0, 0x2, &(0x7f0000000140)) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x400000000000}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2e, &(0x7f0000001540)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb0800460000200000000000029078ac1414aa0a0101020702000000009078ffffffffc2e7e492873316adf66f25bc6b1eae6e796179f32b14076a69ab1a580d4c097ae700b8301b380a3490cb9b473dd9419734bb1b040ae5a19a0552c32433d21a77362ed29320b5f6c30bb91f209e469a34234ddcb19c3eed1c97f9ec27c1e38516924f9fbcb98d39e13e3230c41f41bb23bd99bc0219349062b301f25076fefdb364c04abe8cf975c2b8b9c02bfad70f0f230ab35db3161be2a8a6e2496412b5b0a044b56c57e2b6f580acb582cfbc9485695649da477913c2404ec923a52b84390e97cd114befaf9283b6d4e989cecbe3662fa272b4e314dc170297933d"], 0x0) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/custom0\x00', 0x6, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(r3, 0x80106720, &(0x7f0000001500)={0x4, &(0x7f0000000440)=[{0x8460, 0xe, &(0x7f0000000140)="b477c5a5aee5c998a05944e4e15c", 0x0, 0x1}, {0x9, 0xb1, &(0x7f0000000280)="9ab226ff53196303cfd188d95e0b3b6384348d43bbbe42e42826153433dbacdcecf68e6ec4151f936f824372cf0efd4d6e2b2df2eb0dec68fe642f8306385c0bed1a8e43dc40d7e8279b0d85f99a8e700a7e23505ecdf839a40e4266c75d6994b3626b7c158d601c418641fba727404b006bdb1ca83c847aa1cb9a8f28e65caed468dd23bf87aa192da028ab2e1aedadf3516ed652b47a0cd5ada7707b4d941e955a71c8e30db36398ed0e97482ed2f0a3", 0x1, 0x1}, {0x0, 0x1000, &(0x7f0000000500)="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", 0x1, 0x1}, {0x8000, 0xda, &(0x7f0000000340)="fa9f23cabc682e37a6ed63deb71961fd600cc2e6646666f5db75f332bc13dd021b9e2db2d5e586b23c1cd6704050b76e1bb1c0a54bb0ae556d65fb65c482ab1454640d8817649a98744d70d7efaceabd6822f84dfe81467c9b8aa416ef12a2ac2171f7f746874fb61f585c35f9ce3de9399dddef25c8e9b12e73eac85600d2433063172a4fefbfe359f0f499e3b653d7297f13d040c52fe52466b54c118860b01f0d47178ecc7687421f19e7855b1657d0f4e3fa3f6e3a442df60a61f14260fb6313cadf5a2ccc81613eac39f83819a1d0a222e600f8cbe28826", 0x0, 0x1}]}) close(r2) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:31:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x79d12133}, 0x0, 0xffffffffff7fffff, 0xffffffffffffffff, 0x0) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4, 0x13, 0xffffffffffffffff, 0x8000000) r2 = syz_io_uring_setup(0x3ac4, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f00000001c0)=0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080), 0x240001, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r5, 0x7, 0x0, 0x0, 0x0) syz_io_uring_setup(0x3560, &(0x7f00000001c0)={0x0, 0x3, 0x2, 0x2, 0x0, 0x0, r5}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000002c0)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r6, &(0x7f0000000300)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x1, 0x0, 0x0, 0x0, 0x23457, 0x0, 0x0, 0x0, {0x0, r7}}, 0x40) syz_io_uring_submit(r3, r4, &(0x7f0000000140)=@IORING_OP_READV=@pass_iovec={0x1, 0x3, 0x4004, @fd_index=0x7, 0x81, &(0x7f0000000280)=[{&(0x7f0000000340)=""/67, 0x43}, {&(0x7f00000003c0)=""/160, 0xa0}, {&(0x7f0000000500)=""/85, 0x55}], 0x3, 0x2, 0x0, {0x0, r7}}, 0x800000) r8 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) syz_io_uring_submit(r8, r4, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(r1, r4, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x2004, @fd=r0, 0x0, 0x0, 0x0, 0xc, 0x1}, 0x10001) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r9 = dup(r2) close(r9) [ 1609.879152] syz-executor.3 (11865) used greatest stack depth: 23472 bytes left [ 1609.901431] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1609.906886] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1609.916589] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1609.936697] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem 11:31:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 13) [ 1609.942040] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:31:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rename(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000040)='mnt/encrypted_dir\x00') mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1609.978880] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1610.110904] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1610.161152] FAULT_INJECTION: forcing a failure. [ 1610.161152] name failslab, interval 1, probability 0, space 0, times 0 [ 1610.162958] CPU: 1 PID: 11901 Comm: syz-executor.2 Not tainted 5.10.218 #1 [ 1610.163875] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1610.164956] Call Trace: [ 1610.165314] dump_stack+0x107/0x167 [ 1610.165799] should_fail.cold+0x5/0xa [ 1610.166319] ? create_object.isra.0+0x3a/0xa20 [ 1610.166927] should_failslab+0x5/0x20 [ 1610.167431] kmem_cache_alloc+0x5b/0x310 [ 1610.167978] ? pagecache_get_page+0x243/0xc80 [ 1610.168574] create_object.isra.0+0x3a/0xa20 [ 1610.169156] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1610.169830] kmem_cache_alloc+0x159/0x310 [ 1610.170404] ext4_free_blocks+0xef2/0x2200 [ 1610.170978] ? ext4_mb_new_blocks+0x45b0/0x45b0 [ 1610.171618] ? __ext4_journal_ensure_credits+0x263/0x2e0 [ 1610.172341] ext4_ext_remove_space+0x1ef7/0x3d90 [ 1610.173007] ? ext4_ext_index_trans_blocks+0x170/0x170 [ 1610.173707] ? ext4_es_lookup_extent+0xaa0/0xaa0 [ 1610.174341] ? down_write+0xe0/0x160 [ 1610.174842] ? down_write_killable+0x180/0x180 [ 1610.175454] ext4_ext_truncate+0x1ea/0x250 [ 1610.176023] ext4_truncate+0xc38/0x1160 [ 1610.176571] ? ext4_punch_hole+0x1070/0x1070 [ 1610.177159] ? __ext4_journal_start_sb+0x214/0x390 [ 1610.177806] ? __ext4_journal_start_sb+0x1db/0x390 [ 1610.178468] ext4_evict_inode+0xae0/0x1a60 [ 1610.179046] ? ext4_da_write_begin+0xd40/0xd40 [ 1610.179651] ? rwlock_bug.part.0+0x90/0x90 [ 1610.180223] ? ext4_da_write_begin+0xd40/0xd40 [ 1610.180827] evict+0x284/0x6b0 [ 1610.181260] iput.part.0+0x4b9/0x6d0 [ 1610.181754] ? trace_event_raw_event_ext4_fc_track_inode+0x320/0x320 [ 1610.182617] iput+0x58/0x70 [ 1610.183017] dentry_unlink_inode+0x2b4/0x3e0 [ 1610.183602] __dentry_kill+0x36f/0x5c0 [ 1610.184116] ? dput+0x35/0xcd0 [ 1610.184541] dput+0x6f4/0xcd0 [ 1610.184967] do_renameat2+0x6f6/0xbb0 [ 1610.185476] ? __ia32_sys_link+0x80/0x80 [ 1610.186011] ? __check_object_size+0x319/0x440 [ 1610.186624] ? strncpy_from_user+0x9e/0x470 [ 1610.187201] ? getname_flags.part.0+0x1dd/0x4f0 [ 1610.187824] __x64_sys_rename+0x7d/0xa0 [ 1610.188353] do_syscall_64+0x33/0x40 [ 1610.188853] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1610.189538] RIP: 0033:0x7f0bf9e7ab19 [ 1610.190030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1610.192456] RSP: 002b:00007f0bf73f0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1610.193450] RAX: ffffffffffffffda RBX: 00007f0bf9f8df60 RCX: 00007f0bf9e7ab19 [ 1610.194401] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1610.195336] RBP: 00007f0bf73f01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1610.196280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1610.197214] R13: 00007ffd3ed8e5df R14: 00007f0bf73f0300 R15: 0000000000022000 11:32:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f00000003c0)='./mnt\x00', 0x1ff, 0x2, &(0x7f0000000500)=[{&(0x7f0000000400)="3f6c8176e3dc0ed8a5c901c866cfc518659e691f5fd1528e4616", 0x1a, 0x1000}, {&(0x7f0000000440)="6ab9c2e85d9dc6e63265f6ea1180a2ec098d16c93b85a56c275c501ebe3b072d5b7824a9cfc499bf21d6436b34fa945ed34cb9158be762ce486f4a1caa218d4c022a040288be69966bbe74374f97335a72059b5e2c2ff47c1a41659a4343a580fb7966ab170c60ae37c89a7bdce8efa6165adfe73520f31e31", 0x79, 0x9}], 0x800, &(0x7f0000000540)=ANY=[@ANYBLOB="6c617a7974696d652c6e6f6c617a7974696d652c61636c2c62682c64656275675f77616e745f65787472615f6973697a653d3078666666666666666666666666666663312c64696f726561645f6c6f636b2c686173682c686173682c7375626a5f726f6c653d73797374656d5f752c736d61636b66737472616e736d7574653d293125292e94142b2b292c657569643c", @ANYRESDEC=r0, @ANYBLOB="2c646566636f6e746578743d73797374816d5f752c00"]) stat(&(0x7f0000000080)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x3, 0x0, r1, &(0x7f000000aec0)="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") setresuid(r1, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x2101021, &(0x7f00000002c0)={[{@norecovery}, {@barrier}, {@usrjquota}], [{@appraise_type}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ext2\x00'}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@audit}, {@dont_measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@fowner_gt={'fowner>', 0xee01}}, {@permit_directio}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000000)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='./mnt\x00', &(0x7f00000001c0)='./file0\x00') r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) finit_module(r0, 0x0, 0x2) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x18c) 11:32:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1623.583490] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem 11:32:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:32:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000280)='mnt/encrypted_dir\x00', 0x40004, 0xaaaaaaaaaaaac19, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x6e, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000001640)=ANY=[@ANYBLOB="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", @ANYRESOCT, @ANYRES64, @ANYRESOCT=0x0, @ANYBLOB="751336b3fe312c3623db3cdce97a1b123307cce344d2518dfe1ffbaf5f717f36a7b5693a87a455138a74c00255203ad458269602142ef666b8d4540b69675b68fad7b53564bb34ca9669494ccb72dba96bd923c81359c1b8095ed3c6078374fcbaa7b3d7e7c51f022757d961e5c990337ca33ed51f9ae158f2f95a588dd35237310177001e29b519e52c5375d624cb74d0a748e5ac1048c74f5718d39e614b07fbc750ed4fd7b424314f7e89640028bcab6a9a53aa1769e4fbbcf82a90cbc13d812664f9a9aeb828baccca74763644c4df7ee81294b7d55e98fc6ec5339be5cad41311fb1325782cd6ac8b667221c3bd3e4d3edc57c8d13865bfa8414edc0f3d80acb1dda67b1ca899e12fa3d1ca2e1abc80d1634f1a5869c665ee0fcba137a6ff9a9ec89fe4dfe7e41343af1289ed6ed028a4ae3e30cbcac8c6506b962177782c6a42ce7e068ec8c9aca24b81168c10dcd0730ca506339ebd062e231c809abdecf5a7eadba7b5fad80bee41eb3b633a17182f02b6ad2e5125656020ffb31f451c355898fe6d0895242cbf48df6978c1b503f3112a70a013cf8c1005a791e881b1695d381af21e25aaea024bafa6571902cf31805049d6e9b652f43bdbae786a3ddb4a4c93412e38d2038da13e64f39cddd2db8835feae10d5f52d67f638af6faf91db3f99f4be593f41b2df2d78507e7ad3285dcfa9ac8f24a44c920e811b336085d1ed5eccfff89a8dca4ef889b74b6ac28a2e70b8098d8c042889e5ce577febf94b702ec96f3a25e33e5fd0737b422438ade3301c78fd289139d73a2d3a25b21450a5f248b8c8babee869a8a8eb145684a85882a8cd3d004f20ba76fc2002231383713dd13c567afae3189d3892cdc5b8d8ecbd2c34b31ad4bb4db26a710aef8052b6a60bc0b8c5e668b5403988786bb2376cc6f4d3c069793729b03bd273986b3858cc5e3a377c18d8dc78833a545bd5317192dcaa28847db00ace24a311c1b6a71945704bfd4090b4da056be1f40e7bb16ae6749920312c5c1b75919c249d54d2f9b1eb18943d286a038cc2ad8017f777884fe1bb0eb058145040787f4b45cac0783584cddedfa22db092363ec69efbd97b05c8b1fbb593b85b19bac63872cfbc33dd29e1c45a56799fbf299236fdd30bdf270327073794a871fbb63e4f563633c108a9484ea9b4f8acf8feeb7873f0f1a76ec3811d8863003745b8e66cc108614fd39e51671f2ff3f184a517dd82f576d38c963b03bc6909aeb9d5df9267638178d09d1418c75e84cdd69fd94133942f90e771d5897f1551ffd7b8b2b5e2ad81b67354bd9d6d0cc4b8403c4baf430c78de5e00fdf83dab3bf55d1240264903c00d1847d7833372be9c45325eba2af0b85dc673c17063a0b0b38e25b0fd296614afd7ee0abe4cf1743b85ee5251289066fd6a52ffe7204e2d119575445eea7430917a6e0766f8b3a4c4f79792821b774b11c10b6d8431d3de095e0aa17ba2e9476cbc340083ff4335f7c00c56a40b4d57f2328b39b6b987be6fd76f9941c8d912a5d4e65c6649e973d6ea4b34b9227e94026ab5386df3f646062d14324cfd44de50746ebb1cab52b1f8c0fd04502f4c37d208dd2cdd6b48b9d8c0db2502d6cd65a49cfcd061e6fac8d921341803ca1546b194489a3daa0035bffb11c58b56833a21d99f3a9048677ff9a7c3cc09398b06035f4192bdec8dc63bb5613e6ec2c77db6af9b5777f220c3d92defdf05df22ef7d394dfaf157eec07107b73d4e3b7ca75f68872b8756cc56f1ed169d1cb061d3daa3abaf7437841a25765861ebbc60e8325ba5897c00f82aa694cfc99f341ce6c26e25978be3a9bd73e89aa95438c29190810d09ae14e6ade47440ffb0f753532de1565432af5b5faa885c31f3f8dd4709de4a2077de238b4b3284efb0393f62628790f50dbf5e39b44f6a977a83e3f7c9873894171021a6d93d6cdbd047d7c0e318256971af64adcbb387367620eb7f14fbe9a28634e5e77802521222d5e2ad8da8c40407f58f6cc48f60846e3afdd64f5bdd9744f1a2ac2ebde789387b472ba8e45abcc3f3489fc5b18d2f8e119bdadaa2b0a8b1eddf7f4ae1cc3ec063399b0a4ceb9e13e0fccf7dae0c824668609ac01a4d65c150dcbc9711e0f871e26b0c8ed13e11ab9ca8cb2da99fcc80c93117472f60481d80fc3d5a61c208a5f7343f4733599ec6273bee88b8d4f612a3f429ff0945a8cafea24602a54755d345f1205703437d6d4fc4993c09253e28170c032b1ceb14a1232497e498daad59845edab25bdd3240c50c3520c076e3d92569d1dcd18ef6eec06322314ce1ecb3f2cef4b9d5f4bcc6ebee2a05e4dfe87dba8e447d1719a969b5e45b6dd8092b41c378deb1a0359f5b0ef254bee79b94dbfce8888273052a4df16865560fc419a7edce004004934a8a3a38a8da42ef33877d59979f16a0766815a5415fc2b5de5eda486de3b7ce8e13f9a6b83f2607ce158ec9de37071d4c850da9d5f0b2c6104d5bae122f08b58b0fc1859bb8a8d76c4ff51c8ce62d0bcf59131ca172f076a8050bd0357688c21e35ab4638f2bba031cb6d75eaeee28ad090e7eb141b7798dad6349272624c043700b9be144dbae396904fec5088df2fcad439a5b68752a641ee89eae7a6d6cc604b263d4a0e3dfac66aba6d913657e4593239f0b2c9f0891618f50b2c4001681ada977dd60bcbf6362575835f76c6dfa2d0ac99d29f46e38fdfd10ebc25d36c4b59c4148fe3ca09fd241f0b81bcfcc0ad7d7f993d8743d74bcd1b5e4b0f126912eaac2b1db4c0a73f9d8ae497887999ab5aace111e6461dc07a5e3e3db0c5801226ccc370f4e7f82cff4a595d69cc5955c2f8e11eba91392aa4f83c5686fb0b254114796d655136354a4b32fd6d0c9ff97cb26eb3599f3210e89721c57140eacec2a1b2e153002005b9a1e6aad72730740b152a911abefa609504088037da819db18cb668c328fade4237cf528db0b2c587dc7656262eb35578fb5c7b21c7f0da677d04d35f261f260b20a13216071feae0486397abd0459fbd9ff9b4c58ff5ab816e27786a9ee79cb90c1f0a3686aa33187dde807c5320c97b1696db62b9444cf19546d5dbc4840ca6ecd43ad811e80e6e7e5cf928be78638182fabddc9a2f017389b4b9fefd27b07137ec3b1d9e0957d34dcf5c6996ad5a316c7f9e6d7c355f9649d6e7f6c52e9b7b08a2bb55ca6eeac70a273148fe1239ef77280bfe9e6bb563b54da006552614268d80bec98c265916aa79cf7d2a6ade22194b730201572a34b45a49f648d2ba8e422fc0dc12b753e467e211a309df7fdf020ec962a6b6446eb1cd69b7218c0fef5ee23f87552606ab5a62a71a8a39473af149fe5b423bc1870d782efffd9a024a958843a92d9649ed831f77c4d6ce2532db5618bad9265495278055534b01110c338ae8974f6086936c8243f00278bdd14c7e81573abdaaecd7912b3a5fe9b11968661eba92831986974bcd288206739691d37b10a5713434acc86a362284e21dee143015c1f4613a633c7ea987133fa67c642d3c85b9e3ef5124db275fccd2d0b4cbf5644c1f060b2f1c762dd9540e6d89c4c88fc216c7afdb9a0bfc52fb3659faf8e508bf4be934fdf3d5e3dda1f42f85d88fd1339f110641c72d902469076807b0d3ec9bacb2d616c6408f14094c19cc7fdf865c24dd1fa8d7d7f89c35dec939607796bcfb783d4fcf87fbf04b31072bb4693b937a671a24c8c8f851bf84926cefb70afb3cb874f6c0d1ce310e82996b5bf98393fc59eb9f647278e4db88c619862d40ea4d316ac0b99a144dac961514b3c2c218ed111349d5466cebe1bbf4a09f0c3209004587632eb859edb462ad76e487e6ab6dea968b6aabf347a9119337c3ea83308f527c9844743a7cc2428217a3d9c00b6d76d062dca71c9024cc4cc5879ab3e6b8d260cdd1a02e482948e866902eaea999119c5205f83bb2e6fbfa42c39dd977d084460bd4c2ca74b57cb953b8d57f37c1be73e9b6f1d20b8e122c1cc0f52eda8a725ed59d30c33d7e9b73e8a51d5022fb43fbadfdbd06beaf8455bc88d5aaf546ebe847da20d50bd62555f2455f1601725f2d8befd5dc220572be88ea7ef662ed911294f445f2632fe19ddee0f2b86226706dce3fb61aa1eb9cc4c82c370b3be6e0c0ceb1087c5863ba8bd4e3e9d4f62ebbe2372971bca05d9cf4f8543a17e91f986c76f1f0d0a5321cac3e9efa4e6ecb8852ff922db6f4f0fff835b98db57df45b6db5032e81c26cdcedea4f7dc3a985247afced97bf3c8dce750cff3a29209100e252a5cda9944ef519cb47dfd57191a5aaf2f80c0018f943b04f854ac032c21fa8e81f2d7a41257c8dcebed4424bac05310e750be44e56d26bce83cd977499fc22af676078e64a348f9049fd7be7bd79c382b0c58f900f4e503edd0a6a7029067318232b965acd1d0d1a841797c0bdf5c78252d672d0412f1f4ed74d1e61eaa65c2060d3b37e1634f79617bcb19573f3d2d9c284695c6a98e94eb2cc8d6514fc87340fcfca23ee046844a8b3943019068998a5aaa4b1362df4ec4c79a5cf6e6b0bb2be256208d265c7a96290ce91513abc343ee9428f29c5899cf5a9f68b263f7e13d0605fc477896b532f3d20b1d6e0fad2287c135c4b32f574178f6811dbefe5339701e56cd3a3e329cec2531632a54ab89912b88b504295b8d77ae8d5b61808d8aa52fab57ba6b994d76bf52e1c59ab139313742453b9b351b84204d29e289d7582b088a691d9ea0ea844d804ea695eff5683f19db396fa162bfde334b91e469523de0db9d8f8b5e06d8cb30381c55878105edd7c56c85fd1b75e8f674503019c451c4a284dfb82d7235784e0205d8f131233df41904250b88c46963b08d2c8700986c2e8f7de818f6c03ef88a810aa84f1168e7aa743c0f11952a8db1c024d63b87bb67bd68c20394b627b172f9cf7fb889b47677a90edb22758f3bb2263ceb17a314d7171c7a3698eae0b1cfb930ebdcaea014b613c52978b3a79079196aeacdaa4d47717d707d95deb8697ccbd260fa554a24308c89c3864e5ab72ae9f1c3ba869b7eba7fc8034b225e8b45d09179a066147ebb473dc73228ce9ea898a0fae4215d6e10040a303cf7bec8af718258b0c42ed157507e6e948d1646a05ccbc04cc00183f92cc6142f5006e75d963113fa224f707fc89473a2a2ebe76232aad78a58ba003f9e4961ea6faaa3b6d761176a7296ba1fbb8c906a5bacb1ddc430df7738a1929761fd29ab5072d54b4cb5578369916d137471d5e9ad673188f1c28ceb087705c98b55e4508b01365d0e385a0392b4cf8abf6daf7866ac466be8cbd57ce3b1a5e9c7226056fd8ee66aef53c9036e38eb70a5a1555361c131f1983c71e8d950ef04fca80fa4a1f6b930d1b2f54577f560aa50cc3535303bbf403d870e534075c75a8d071fec93277fcac6bd45b25eaf8e1b0319876dda8b00ff3dc1ce8fb6525be7520c70bb1423dbfca845c372a56722214f5b5bb93378cc779dc4cbd8df2aec0b95830b4ab9be8970f50855516858b6882288439bcded6248de23cbc929dd972aeb61e1fa6205cdbcfce3e418c1aaff3bdad354e60aacd48640aeb932730d0fc7ae5c6714b7dbfb5873a42637a6427cdc07036fe97993be773fb6178574452efcaec288aeb4ddaf4dde894392d8e04c724f88616a398185968d27fcabc845399f32ecefd4e0b4ae5c44e9fcf8aad7caaa0ed2ab24b0514f73976664616f8cc86958cea815825a5bc30c307b9341b10b53410bb", @ANYRESOCT]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000), 0x117, 0x2001) inotify_add_watch(r0, &(0x7f0000000080)='mnt/encrypted_dir\x00', 0x61000469) r1 = inotify_init1(0x0) r2 = inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) inotify_rm_watch(r1, r2) inotify_rm_watch(r0, r2) mkdir(&(0x7f0000000140)='./mnt\x00', 0x131) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:01 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file1\x00', 0x8) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 14) 11:32:01 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x12800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) getpeername(r1, &(0x7f0000000300)=@l2={0x1f, 0x0, @fixed}, &(0x7f0000000140)=0xba) faccessat(0xffffffffffffffff, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x1) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000009, 0x40010, r1, 0x8000000) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"/625], 0x98}}, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r4, 0x0, 0x20000010) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000380)=@IORING_OP_SEND={0x1a, 0x5, 0x0, r4, 0x0, &(0x7f00000006c0)="48c85ee7f61daed3e307cee1bb24fd20dfd97fa461f9f92456a75df6a2a924b080d12c633edeeeb40b40683dea964e5dab15e1356234028706088ccd027efbfbd3a2d3bdb4c8ec2aa241e620209afdabe290556288c2d15cae2417bcd82de349abf50de648fd25733e3384345b5fad5e16d9ec81f173675e6cce2146d236742d4a6f051e69de8904af22aa2d49416b880803a54cbc8996bef330453e38bcc1054016b88d0b6c1911520c80f7400e745ffea8509772087e983cb4695b84b662edf7f8da590b35424cda445e520bd0aaca2e6e3d1a116fd664db4330dcfda91481af10be02e8570d5086ffb21970ea", 0xee, 0x40}, 0xe1) r5 = syz_open_dev$vcsa(&(0x7f0000000480), 0x8, 0x101000) openat(r5, &(0x7f0000000500)='./mnt\x00', 0x200000, 0x92) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000002c0)=']/^\\\xc5.%}\x00') name_to_handle_at(r0, &(0x7f0000000080)='mnt/encrypted_dir\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="2000000008000078d784d5be6aa150ff0000000180000005000000027fffffff0000029000000000efdc02464a75ff816a047385e89e0ae17523210edce06b50a3fea02cc8016f9674ff2ef166548614d7eefdabb63d557ef10707f3f96be6561e0171d5776d42faf1255fe7f75a3fc2ef794f27c52aea6fedbfb5253acbe2a8b9a1bf6dc61a1360bf0a777a3d249761c1366941ac211f8fd64bbd9de5a08242245e1fe361eb5aa4108ce2cecbf4e92f9a16f5244a099e750dd0d1e9bef484e270d26aa3a1c7d5acc7e06ed4cd44e895fcba57fc1e4a90c294"], &(0x7f0000000280), 0xc00) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4) [ 1623.607271] selinux_netlink_send: 33 callbacks suppressed [ 1623.607289] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11852 sclass=netlink_route_socket pid=11918 comm=syz-executor.1 [ 1623.626052] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1623.650173] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1623.650623] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1623.666315] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1623.669341] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11852 sclass=netlink_route_socket pid=11918 comm=syz-executor.1 [ 1623.671692] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1623.682963] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1623.689411] FAULT_INJECTION: forcing a failure. [ 1623.689411] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1623.691594] CPU: 1 PID: 11928 Comm: syz-executor.2 Not tainted 5.10.218 #1 [ 1623.692601] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1623.693806] Call Trace: [ 1623.694200] dump_stack+0x107/0x167 [ 1623.694741] should_fail.cold+0x5/0xa [ 1623.695308] _copy_to_user+0x2e/0x180 [ 1623.695748] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1623.695873] simple_read_from_buffer+0xcc/0x160 [ 1623.697692] proc_fail_nth_read+0x198/0x230 [ 1623.698333] ? proc_sessionid_read+0x230/0x230 [ 1623.699003] ? security_file_permission+0x24e/0x570 [ 1623.699727] ? perf_trace_initcall_start+0xf1/0x380 [ 1623.700465] ? proc_sessionid_read+0x230/0x230 [ 1623.701130] vfs_read+0x228/0x580 [ 1623.701646] ksys_read+0x12d/0x260 [ 1623.702169] ? vfs_write+0xa70/0xa70 [ 1623.702723] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1623.703483] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1623.704228] do_syscall_64+0x33/0x40 [ 1623.704772] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1623.705506] RIP: 0033:0x7f0bf9e2d69c [ 1623.706048] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1623.708700] RSP: 002b:00007f0bf73f0170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1623.709803] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0bf9e2d69c [ 1623.710844] RDX: 000000000000000f RSI: 00007f0bf73f01e0 RDI: 0000000000000004 [ 1623.711875] RBP: 00007f0bf73f01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1623.712903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1623.713933] R13: 00007ffd3ed8e5df R14: 00007f0bf73f0300 R15: 0000000000022000 [ 1623.720060] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:32:01 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = dup(r1) r3 = dup2(r0, r0) sendfile(r2, r3, &(0x7f0000000000)=0x412, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x8, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000140)='mnt/encrypted_dir\x00', 0x9, 0x7, &(0x7f0000000780)=[{&(0x7f0000000280)="0026c7d0c82ddcfed75be6570f4950a078f013ad17021af5518a869f8a32babc8c906861c9fb98025983c806d49124f55a19a026db59b4d5e2593329832d245349c07e47d01923cd834e8bc5c6a00ca8bea86bd2ddb4e0bbf195ee7a3072ba350d1ee84f129149147dd76e1bbdd25b65b5a505e62123d0034a922a0afe02b5c7fec2e75547673c9f0efc3430420c5f4a9abaf87990864438a76ef3", 0x9b, 0xffff}, {&(0x7f0000000340)='8', 0x1, 0x2}, {&(0x7f0000000380)="0c0e8c7104e2328d5872ef3b4e4f788b35c360f3af8edbaa9fe5942e7ecb6bdbcef5b8d2612166b8fcc828fd04a220411e69822416d292393842d1d42854915a05", 0x41, 0x1f}, {&(0x7f0000000500)="62de10b8978a622123e422b43ce6a9c73742c32c38148d3fbae79afa9f249c023cf4dde36b98a557ff15485e74fe101f5941018fd31499536cd17c8db865efc442ee543896bd6c01374914653b824cd905976537bbbcec5489d377607c5674b362cec39134d4c3ec134bdb42ddc7318b13f794dd17dfee97d127032e65bb8686bf938382f6d7f947d70b8860d34f278dabd806efdfe79395c0a8f744011f12086c7cb5c789409d5c1db2571ab2388805e542e1f806665e7fe13f9d3881bbb89ac2be53d2ede2764f5b66b562343d5e023c1ea98c6989fa0c283c36df6bd854b366433f3dcd5432db453ed1133ad7a35eb6feb8acbe80d7dfe61c", 0xfa, 0x1000}, {&(0x7f0000000400)="7e331a4eac9c9b682443f57f5aec564399bad38e3ee72a7746f4628b59498adfe0f6d8a2c720d6f15b5d9d3be0e9433053d72206ece68b2587a4a82c9a355bb5f60f3be0cd50bbbc1208f8c42563e168119c68c58ef0ba9e4bc56738dc5d0935e0fb145823f08afa3f31458351b23a2aa9e944", 0x73, 0xffff}, {&(0x7f0000000600)="4b8165821b7da212a9535db76b902eb61e8918164c89ca691d3d31242986aea9dc628d323a196214b8e80968758bd23936d6f0ca418c50e0a904db5ac2ed90ed68c0d6d8cf7336d818b5ee5e8688934c01af3f96c1edabb4d2b4100cbb4956602e0587b0d496688bafd327ff1e35b2409052753f736e0f609126dff9c98dca5de8965d6cab02c0c9dac8b5422f2361c2dc8567744abf3f28da1da07d9bb19c676f953aa5bb24f096ee3196b852f193482088c8554bbbc5cd5b9a81f75813596663ddeee55195f58c88", 0xc9, 0x800}, {&(0x7f0000000700)="5daf47511579ad80902aff760ef32603749a009bff8ae873126fda316e2e701e21366df48954130b8a849964ce47c0468f1e96428e9b1d28d6eab0ed0014228d83f5553016f67e7ad0ea70d17ff3f90ddd51ad09f6cca06752965fabd388ae74c8c5edf605b79e8c606ae5cc0086", 0x6e, 0x2d8d15b9}], 0x201040, &(0x7f0000000840)={[{@huge_within_size}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x32, 0xec2d9498d424a4cf, 0x36, 0x31, 0x31, 0x15, 0x2c, 0x30, 0x2d, 0x33]}}}}, {@huge_advise}, {@huge_advise}], [{@dont_hash}, {@fsname={'fsname', 0x3d, 'ext2\x00'}}, {@uid_lt}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, 'ext2\x00'}}]}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$bind(&(0x7f0000000000)='mnt/encrypted_dir\x00', &(0x7f0000000080)='./mnt\x00', &(0x7f0000000140), 0x200000, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(r0, &(0x7f0000000280)='mnt/encrypted_dir\x00', 0x0, 0x4) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='mnt/encrypted_dir\x00') r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000080)=@v1={0x0, @aes256, 0x3, @desc2}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0xae, 0x2) 11:32:01 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:32:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) symlinkat(&(0x7f0000000000)='mnt/encrypted_dir\x00', r0, &(0x7f0000000080)='./file1\x00') perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, 'mnt/encrypted_dir\x00'}) chdir(&(0x7f0000000140)='./mnt\x00') fchmodat(r1, &(0x7f0000000080)='./file0\x00', 0x10) [ 1623.968743] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1623.971412] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1623.978942] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 11:32:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x800080, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x6, 0x9}, 0x0, 0x5, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') unlinkat(r0, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x0) [ 1624.025678] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1624.055593] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1624.066706] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 11:32:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x100) syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f0000000080)='./mnt\x00', 0x2, 0x6, &(0x7f0000001540)=[{&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="df8c2163dbd6124f3362a60488a3c796a53e6f7769416672252079afc3c3f691c618cc2aa5be1cec2a7650c1f125754259d026f06e892352fdff880c0f8d37dfc9ff5601b859396c03bdbe382c5716cbcbc8846184218fd9cd64264ffdc9171889ef5f10dee87af93e68470d1768f5956175b2c1c5be0e0729e94e3a5baa9f4cbdbec8f5f088030167920ce36365", 0x8e}, {&(0x7f00000012c0)="dfb9ce0817088a6682c1439b4a3bf5e69b48155de8a83e428cb10627976973ba408ce4242257b42b0e4a2118b3d1a0dad632f4e6f96e7a63bb64555d5e64f19e34d378e8be976de3677035fde99137c3", 0x50, 0x4364}, {&(0x7f0000001340)="4eecbc6d7d2be2df9110475e968180e26b4db8014ea0de6d6ab0350ff998f3915de5c0fa470e00bd6afa92b5384283e36ec2db82a5e9d0b3a22f4c839d4a22294ad3cc01204973499b9f58487a0b12dc07798dd578c033a02dcdc8393db94cc2eb3bc6a28d4858385b384787f634e78f9728b2d3610bc61e445923789c04d9a779452b9bad1b73ec57b02a382d027425bdb9b04304e14ad98723a8a86c96bc9bfb9f1eda0f7ac6ecc73388f11fd9e828e4006ec967530a37b9b8e11feed8050c91795e1bbbfac9d00319dd800845662502065b491f92004056e29a7910055808c1b23c41ecf98150de3a44", 0xeb, 0x1}, {&(0x7f0000001440)="49e7ada77f5c061c745ee0bcc2e2c729b953832295cc8a1666ba9664b36fe6b4de972f3d5edec6b0041e5265a14e3e04262c9f011157b40c25bf97a5cbeb3b642618c4e5c805b7258d5b2e6b453014", 0x4f, 0x2}, {&(0x7f00000014c0)="be111e04966fcd2ef931f7646d04a0387b7cc456cb7bcc6985ea704e41f3675372e8e0c1e088472b4f0c9ea1789f978c9a013dd02bbecb8cce069f1b14c77eec3fbe08e73b9296a0bf466fd05a", 0x4d, 0x6}], 0x44c00, &(0x7f0000001600)={[{'ext2\x00'}, {'ext2\x00'}, {'!!}(,.#{\'-+\x89/{'}, {'\xda'}], [{@smackfsroot={'smackfsroot', 0x3d, '@.\xaf\\,*{&'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x66, 0x32, 0x33, 0x62, 0x32, 0x2, 0x31], 0x2d, [0x31, 0x62, 0xc2], 0x2d, [0x36, 0x6b21610ac79e6639, 0x54, 0x66], 0x2d, [0x32, 0x61, 0x37, 0x65], 0x2d, [0x33, 0x39, 0x31, 0x30, 0x37, 0x32, 0x66, 0x34]}}}]}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1624.087231] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1624.100258] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1624.122278] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 11:32:16 executing program 0: ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './mnt\x00'}) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, &(0x7f0000000500)={{r1}, 0x0, 0xc, @inherit={0x60, &(0x7f0000000280)={0x1, 0x3, 0x2, 0x1, {0x13, 0x7, 0xfffffffffffff5fd, 0x5, 0x6515}, [0x0, 0x7fff, 0x10001]}}, @subvolid=0x8}) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000140), 0x4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000300)={{0x1, 0x1, 0x18, r2, {0x3}}, './mnt\x00'}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x5, &(0x7f0000000500)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2102}, {&(0x7f0000000280)="6a7192e19b7f0dc31a996b56e9c25bce0d3dd4f822a246b578eb34ed849bf525182468072a9a0dd5543185902e77ec03bae7e09012ec4a38378f6f922ce64c277e318d7eac8f9e6672a7a498e6ef6ba2d069683e85cd888d996bed3d4524793d6143c5c8952b0642e7ce9c97b6ac1f8b5d7d1a9fbfb88d480877e8ceb5e0a279e6a7839674e6be21e725b6020de0332160d4cf85c68505f57bb1a0eb41ee2560dd654544ff1b3ab3a2188eb6db936e1c4956d6aa356a254bcadb634a811cea38ef8547f34531e4fa42b1159a5954ad0cbefe79b64e7c4ffd282769bfea7816a7263ea9ef9e0058dbcac29c2f19", 0xed, 0xb7bc}, {&(0x7f0000000380)="ab292b61abf906a6fe3727489739c8e0e1e19a43f50604f8c33ce45b5dc0da13c78abe3b5dbcf99402db136540703e42de5f460d2c5cd71a7ff266cc45b8cf1cffb1ece6a1fb80b64a924a265c7d8ce9b8f4dc2f878e2a024791d56b341cc2b64460beab89d665678c7830fd6492379cae5a805a99fc60ff2df264c6b8755085f0fdd5e7f3e5f7797d398a568bc37c57de19f10eeb5e03e0cd70c2417be1bed942db6016c60a6fd673ea3cf3e959b07d2f45ae9fa7b50ee925df488574195e9be5a0feed8b8eb1f207dbd4", 0xcb, 0x61e1}], 0x0, &(0x7f0000000140)=ANY=[]) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000014c0)='dctcp-reno\x00', 0xb) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000001700)='./file0\x00', 0x101) chmod(&(0x7f00000002c0)='./file0\x00', 0x12) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r3 = syz_io_uring_setup(0x3ac4, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f00000001c0)=0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x0, @fd=r6}, 0x0) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) syz_io_uring_submit(r7, r5, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r5, &(0x7f0000001680)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x2, 0x0, r1, 0x0, &(0x7f0000001640)="35724a7ad0703a867d2d45bc8b5583", 0xf, 0x40000000, 0x0, {0x0, r8}}, 0xef6) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000140)='mnt/encrypted_dir/file1\x00', 0x3, 0x7, &(0x7f0000001580)=[{&(0x7f0000000280)="4076f71f5b37a148874085f1f168f5", 0xf, 0x6}, {&(0x7f00000002c0), 0x0, 0x6}, {&(0x7f0000000300)="6212cb1763c10f5f273c95aa6f7047c1a60df75913832a20d75f195789a95077d7cb0557f0dee6cef2f72a7794b9aeb73b2d85724372de85be330dff6de681062d9abdec4546afa2ced088751d279b512ac4f391", 0x54, 0xffffffff}, {&(0x7f0000000380)="c445ed403738cdd1cac6d14253fda447600417ad231ee2eb4d66fcb457d2b10ebcb3ba785d76a801f23de1324751412943d77fef67903d3441184672e9ac93278d578c1485b1f2bb6522ba8d9be5c0b876959e8caaf4729ff6ea8311ec6bdc20064e8cd32c4e693c39eed9c94ab52b12cae1282c1d8c946e4fcd091b5c", 0x7d, 0x80000000}, {&(0x7f0000000400)="19a3130eabe97fcd7561fadafef939d7aa8af53a9a60c8b22cce7bbdd3e4d18bd23ecdb070626f57c6e0fd701fb029f67cfd1c6ab820298bbf5298f6e75dd15c4992eab36c8c1b927d2109da2085031f6ff456c158ff84b935999bb0d2652e25b215671e5dd11635112f2ae9e7febc4f0b34df80f532c1a06b5b73e8dc48fd3c7123b5bcec2a8783330ed66386d47c26b75eebcd0e9aec3d7699e1d7ef8d055afb8eaf7f", 0xa4, 0x8001}, {&(0x7f0000000500)="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", 0x1000, 0x9}, {&(0x7f0000001500)="4c0dbc7b1d028403160e13d77703e19837d806d26ac516715e7d98bcf148695a1c994f46e0bccefb3c62f36dadfad5d70b1386fd4d706bbc487e2766d213ff449020ecb633ebe17b013f284bb63236", 0x4f, 0x20}], 0x1008, &(0x7f0000001740)={[{@utf8}, {@unhide}, {@cruft}, {@sbsector={'sbsector', 0x3d, 0x5}}, {}, {@check_strict}, {@utf8}], [{@appraise_type}, {@dont_measure}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x33, 0x32, 0x34, 0x37, 0x66, 0x39], 0x2d, [0x31, 0xbeeb9d1c916e99ff, 0x36, 0x37], 0x2d, [0x39, 0x65, 0x65, 0x39], 0x2d, [0x31, 0x31, 0x37, 0x65], 0x2d, [0x30, 0x35, 0x28, 0x32, 0x30, 0x61, 0x37, 0x30]}}}, {@appraise_type}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x67, 0x78, 0x32, 0x63, 0x34, 0x32, 0x39], 0x2d, [0x62, 0x5, 0x34, 0x33], 0x2d, [0x30, 0x64, 0x61, 0x62], 0x2d, [0x66, 0x64, 0x65, 0x37], 0x2d, [0x34, 0x66, 0x32, 0x31, 0x30, 0x66, 0x65, 0x61]}}}]}) chdir(&(0x7f0000000000)='mnt/encrypted_dir/file0\x00') 11:32:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='mnt/encrypted_dir\x00', 0x8, 0xa, &(0x7f0000000700)=[{&(0x7f0000000240)="382be07a0b9680deda937816af971d1a42ef88bf4ad4c361f958b2c3a534e5e21b49ff270084b1703a88319d12f5159de98968780057925d532ac6e0fe6011a62d6e9d60916c9328e8e9f0c0c27067c38bf9f37103dee8ac0522dda2f3b1126ca89716d63fb0363bd119ecc6fc47848b208c66109d984510acbec46ec8983fc999911af1dc366f", 0x87, 0x9}, {&(0x7f0000000140)="b86bb5224df4b30e204a9d5bc9faa6e50d556bfe18d0b21c9692e04add759c3eed3184f729af6d4a6339037fff75c9519360a4e9a1b29217f7ca", 0x3a, 0x80000000}, {&(0x7f0000000300)="695d3f64fe0790a25faf37793bfb0b0d51cf1247349c4903174cb20f4abd0b825ee9ca58b6d5c872c58a7ba17d47898850190a56f09ca6a90fb712c5d9f6e7ad245dfb3035c1a5", 0x47, 0x7}, {&(0x7f0000000380)="11d8800de5edbd4b5e977353a91199bf3322ae3b929d516cbc2603", 0x1b, 0xe1}, {&(0x7f00000003c0)="fc2b7a3da7f9041dda7bd98295f4dd584b458ca91546e9d00159b5b0c078a497d0e99011096c19b12409bc925d54214b9bd24b46a8b6c4f805531f2cbef52788c6e584ae3011d116970f3c940e0833dd29e65e1415c44544621b30a000fe7b7023478c05a06877e7e6ef49db8a5e2351418b53f5ace74466725ff4d43ae367becd2a97e5", 0x84, 0x1000}, {&(0x7f0000000480)="0b23e0ea", 0x4, 0x2}, {&(0x7f0000000500)="6178ab4bdb7313b58063db9e1b4b71f8f3a3caa3b8b61e9d18154b0da24f8b07aab408d55b164497fc5fec278bca1c7453a0aea92210e07c4a8ca083b1f3557b6334dca2fab2dd64f565942a7180994b9d0707e0879313f33092", 0x5a, 0x1000}, {&(0x7f0000000580)="48c7a53dca40d71afd8f828850a7e5959b176a028fc85c04eccf129c9bcc5de461bac0d55764e2c56b83a9bf007f9976d0f2af0164e1a4acf20a621edd5658ee9faea653484b2083bc8031e8610bfb69bc15475da0891e78e1015ad7b214f821e3c27ca5936f967a87fcfeb40606d382f32cf9f1ec74022f390bc34619db9701b5842274f990f2c18fc7c6d30b63bae480f5c749775c656fa891472345d761", 0x9f, 0xf8}, {&(0x7f0000000640)="c1c98e067bb89b301700fdc108698f83263b76156b9ed8b11f0fb6ceef4f35acdeedec2c00a3e9a2395a533ff40447c3262b0bca913ea4340f4e0bb2920f61846a12605b4b1d2cbfd1e9640f1cc9f36d25cdd02fd1c5d80213edd962263a652e3e5b1a4eef1b5e1caacb258f0822f7ace2", 0x71, 0x7}, {&(0x7f00000006c0)="1f2367840ce6b8f8ab96dfc9ae61a653cc0edf1dd18899a46b3fd50f2006fbb487a972bde7529ef00b897db5", 0x2c, 0x1}], 0x840, &(0x7f0000000800)={[{@fat=@dos1xfloppy}], [{@fsname}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfstransmute}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:16 executing program 6: sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x50, 0x0, 0x20, 0x70bd28, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x6}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000800}, 0x20040855) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000280)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x100044, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3ac4, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f00000001c0)=0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x0, @fd=r3}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r5, 0x7, 0x0, 0x0, 0x0) syz_io_uring_setup(0x3560, &(0x7f00000001c0)={0x0, 0x3, 0x2, 0x2, 0x0, 0x0, r5}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000002c0)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r6, &(0x7f0000000300)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x1, 0x0, 0x0, 0x0, 0x23457, 0x0, 0x0, 0x0, {0x0, r7}}, 0x40) syz_io_uring_submit(0x0, r2, &(0x7f0000000000)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index=0x4, 0xfffffffffffffffb, 0x8, 0xfffffffd, 0x7, 0x1, {0x2, r7}}, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:16 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000080)='mnt/encrypted_dir\x00', &(0x7f0000000280)=""/154, 0x9a) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x1}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:16 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:32:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x0, 0x5, &(0x7f0000000500)=[{&(0x7f0000000080)="df00c86115a1496d70826660c160f32e1e8d814101f10d62e930c53ddca33cc3feb0", 0x22, 0x9}, {&(0x7f0000000200)="c3ad6ad3278d375877224cb8638354f75c2397814bf7cd025107224ed24e898be04b4cb5e565b8a790dcc31c6bdc3d81224b010534d284eed19e2f40552e95b3e6af91d78c1eda9ab89c3b0d93b35eedac6d6de1629a472bd8fc78659a97743586a5486c3e5192fb8422d43295f7186c02e7d8789387036dccf564cd39ad742e8581696cd3fa972d065b6c1b30e4f09c490241d0f94dceb2ee2eaae24ee12dbf789a9c3cdd698abf007715dd28688f7f24be550a3828cbcb787e14281488e5e158deb61696a3afaf1b313a323a91d815ff8cb4126befb594bb068f200211bc67f4d904", 0xe3, 0x9}, {&(0x7f00000000c0), 0x0, 0x4}, {&(0x7f0000000300)="aeb56c60026bcdb6191c433fc13920b4bc93437cbe518b7d9d542f3aa793377a646cb043f8e802601685f42a7fe0f73c2a197b2b6ac4f53599e0327e8a842c0066e69d57bb9a018d5986498820257427d63c6a6727bc7b1ba93b0f4934189ba374ab8360c923108fc0d58734889b5cc7740821aa83a175c502261e8290bc24879c6dd3146b1a82f66e05c0513d313b8807ade1962d4d6ae454697374148e162ee3af6c8b73e96365f9109f71d82a3707230892f892248ad4", 0xb8, 0x6}, {&(0x7f00000003c0)="46329dace2df6c5cb5f8c93764b1e38a7a4d08f560fe756329294263bb864a84829bf85d2aa1143e911ffc648c72266b701ba76ab1df800578ed4f51fc5de908c52c90422176c11b771857e341cfbcfd0f5dc0c67346b2e42bb8a049fab5d4e7c1ee0b3dccc2c335079db9e071e0d9f0f25ad8f7f8d313b516045440e516a7507788719c354e4ac5bd96af827cecfa07926127469185da2783cf5b7756ea09553964b3dfa72b266d908cdbfa66ee18db480d48d31198219a32db79380a8980f87f5ff654197885f37ce7", 0xca, 0x8}], 0x80040, &(0x7f0000000580)={[{@nodots}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x32, 0x35, 0x62, 0x66, 0x32, 0x35, 0x63], 0x2d, [0x63, 0x63, 0x66, 0x34], 0x2d, [0x62, 0x64, 0x36, 0x62], 0x2d, [0x62, 0x30, 0x63, 0x62], 0x2d, [0x38, 0x64, 0x37, 0x33, 0x33, 0x33, 0x63, 0x32]}}}, {@obj_type={'obj_type', 0x3d, '\'-\'&'}}, {@context={'context', 0x3d, 'root'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@appraise_type}]}) readlinkat(r0, &(0x7f0000000140)='./mnt\x00', &(0x7f0000000600)=""/66, 0x42) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1639.215895] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1639.223127] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 1639.226550] EXT4-fs (loop5): get root inode failed [ 1639.227337] EXT4-fs (loop5): mount failed [ 1639.235306] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1639.241177] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1639.246417] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1639.251965] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1639.273945] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1639.276165] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1639.284892] FAT-fs (loop2): Unrecognized mount option "fsname=" or missing value [ 1639.294310] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1639.338394] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1639.376929] FAT-fs (loop2): Unrecognized mount option "fsname=" or missing value 11:32:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000340)='./mnt\x00', &(0x7f0000000380)) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='selinuxfs\x00', 0xa, &(0x7f00000002c0)='!,.\x00') mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = openat(r0, &(0x7f0000000300)='./file0\x00', 0x440200, 0x3) ioctl$BTRFS_IOC_ADD_DEV(r1, 0x5000940a, &(0x7f0000000500)={{r0}, "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"}) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') unlink(&(0x7f0000000000)='mnt/encrypted_dir\x00') 11:32:16 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1639.538889] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1639.553847] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1639.555113] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1639.559691] selinuxfs: Unknown parameter '!' [ 1639.567357] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1639.571300] selinuxfs: Unknown parameter '!' 11:32:30 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:32:30 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000280)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001f9eefc306d9455006eb3cd21886fc1c040650b8a11f5c92818ec0c4379a943d80486db397601bad7ef1fa350dca90c141c7a7b6fb51111304e9f3f47d2dd688892cf850a48bfdac67172269eac09c8ce6ca2f48cd38efdc77ddaa7865f0d9334024a882f25eebb739bd71e7567161c", 0xc9, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x20ff}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='mnt/encrypted_dir\x00', &(0x7f0000000080), &(0x7f0000000380)={0x0, 0xfb, 0x10f, 0x1, 0x3, "e4539ea71bf7501e92aae3db4f03e90a", "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"}, 0x10f, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000500)="30f412337368af183d66a82fc254bebecc84727256f150f5d7cc6011706fd88a5fefb297a0ccfac78d1616e7c837aa253a27e5fcb77245826182d1e92e9756fcddb47fc467c18166f8a420a47700633fc36b", 0x52}, {&(0x7f0000000580)="d6d813e9a37ff31d7630ff0925cd049378181636f25e2d2b449c90d949a2f2c8f7a66b1af8e81284911360578cd25af272baa72907a1ce2750d63066947e0cea6a7af0fd290ae768dc0944cf742584b801e7ba9fcfff951b01ac6d5bfdbf9074ae70725d91c68ecb81938038497d19ed4d49aa6a571bd298949a63811147e8d172f1e8e5283004d6b020a27b31a12381c077df74", 0x94}], 0x2) [ 1653.567183] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 11:32:30 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FICLONE(r1, 0x40049409, r0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') lstat(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000280)) 11:32:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='mnt/encrypted_dir\x00', &(0x7f0000000140)='vfat\x00', 0x80c02, &(0x7f0000000280)='*\x00') ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') open(&(0x7f00000002c0)='./mnt\x00', 0x8040, 0x20) 11:32:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000080)='./mnt\x00', 0x4f0, 0x8, &(0x7f0000000700)=[{&(0x7f0000000140)="f641bac97350fc1b3487850fd26897e83c30157c", 0x14, 0x9}, {&(0x7f0000000240)="b35efb5ae8b43b7d32070f7ba32a59c632529f6097bddd1dc1120d1e9c2c4c85021a928626a0391b71eb9d9403b1d21644bbbcc3c9789a45fd198f80a49288703ec822758f7cbac90c777b3c8672d08de721f9a4243477c010bd8c670f1e38ad8dc960a4a0ce4f3004e4ce98863caa9eeb5b2ce23d484e7eec4412361dc315ebd821ac270edc3c1abc66ee7946f6", 0x8e, 0x5}, {&(0x7f0000000300)="38dfc8fe2722bc009b1cc16bd4f5bdee73194c399894b6d0f02b3176a2450e124f3577adf739d49e67c3398ce64f4fd68d76f26d35726682f71e9cc402cac41137d8065deeba304f98b89b2eedc9d3c93ffcead3bdd92fd5c116fa911472b376f7b8be605de2e676a231863a16d93c19dc682a0768e2e87f2ea0e8d4cc39935c9e385ef12c98023d32f11f9a3e", 0x8d, 0x8}, {&(0x7f00000003c0)="386e738d44be94a847f2f4b9d836ce4187a8bd06c47b611cbf7358f4e179970605821e03caceff85a967fb26af8b7198fcc6b0e86560bdbae8c5e2465d8ecb0004c2d32b354a43771f0705d9af1c5be396f3301df14e0bfa367859a20f31b28e080d06a34291e6", 0x67}, {&(0x7f0000000500)="157de3a053a784520f5cb6a628423703055706491969e30c71ce6fc61aea0d9681d1467e4dae7c870bfb2503eb62de5e14957e80d3790aa69848aded4b045d36e9b0548711568d819c518cf0bbdc34f835e843d557bd8f7b3ce90646a1d6ab7604b62d89dd8bf49c1c724242602e2dcf57935236de25066f1855f07696c05c4839bbc83de8fcb9d4c55c40efd1bdbba8ddcc01f8743aa7787ddd739e3840e78ed0f478964e882dfe21f2649c06eafb9200429183c3f28d4a8b3485565c9424f6f505ec5577b32859815d", 0xca, 0x3ff}, {&(0x7f0000000600)="7869da412c920f5a485da0237b4fdd0e225e0077ba4d5e0aa52ea612ca8e46802bf7e2ef0792c6b6fa42d23c542ecc1e88b1982cb2cfaf3e1f7602e5ebd78df81f27c578113931565aca5cbaf814c3e36e5938a190993b2e1366e93a3e9a65a0df058a591a726628084033b15d4a58a7b59d978ef57fb9f5d4fb284078f3509ececd074b9b48261bb27ef3bbfcf75c0b00d5f3da50e610dfc43415f0f8b09c4be35aceb72613beb7", 0xa8}, {&(0x7f0000000440)="cd27d546e93ffcfea53f4c23374fb56e2d2fbfdf1a5598c72704000896c105cc8632470df343a76aa74767773dd1618dcea86c109e278f35641713fda2baf25d2477f965241484a10ec17038fc4ffe", 0x4f, 0x2}, {&(0x7f00000006c0)="2e4e971460ede7c01eea12aab59ccc61", 0x10, 0xfffffffffffff001}], 0x2020010, &(0x7f00000007c0)={[{'ext2\x00'}, {'ext2\x00'}, {'#\\-%^'}, {'ext2\x00'}, {'ext2\x00'}, {'ext2\x00'}, {'ext2\x00'}, {'ext2\x00'}, {'@'}], [{@dont_appraise}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@dont_hash}, {@dont_hash}]}) mkdirat(r0, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x4e) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) getresgid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f0000000900)) fchown(0xffffffffffffffff, 0x0, r1) fstat(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./mnt\x00', 0x9, 0x5, &(0x7f0000000600)=[{&(0x7f0000000280)="84c78e6c9be8a5a444585bf0af893d3b9475080d2fef3d076aa2fc6bdcae392f5b9f70940ea53f79a95f6b01a8ed7ceba8e5c03549470145ced82b8f84c6277b409e5bc2c64ded655050c026a5387a5fe9910db0b4af4cdbf8079210c5db2b5d330f4988cbb3c5666337072be30d734e184e7c9573da7271eb42e0dd50afb6a86ee5a472a4617052a0ab48af87e24705f68f21792396", 0x96, 0x4}, {&(0x7f0000000340)="758d035edfe8b2615dca9d42d6fbb3e74eab1ef5388682115bef6ed01a473080e674470531ad3f3fdc29c2c172e74ae91d82f4c320f26f2ceaa7deb17b5c46698238b499ab190e70227a93d1afe1a1c62752b156f894219bfdd5517e75d6a36238d95a60e3ae67fbcaf696aa32a81283632ed285aa286bd1e02da5c07f0cfe093e3f18ce03915163069a727290eec6463ff8ba4c46d85f19569885ab8d59adb3bd88d53f55f17f33c2fd50c21ed553b6ee8611f45746", 0xb6, 0xfff}, {&(0x7f0000000400)="e84168946d8045d0a7ab937931c5d23d39f03cd6573ab648c0f3fb5c9f2c18e90c7e5168541d4640d15735cf32c556a7670feb1464677aa74eb7c6b1c3deed270fcef07361cda9a16c8a623f4730e34a57a35c2fffdf963244ab83261bcfbfb4a8c47d33ad203ace13e7c6238b93d08c913f92fd1d6b993ab86fda8d54f90f96a569781cf0241f206291b0", 0x8b, 0x5}, {&(0x7f0000000140)="692c9a90249747fa7806564d07c0bbb7363e105ad862925d3e51323d4e187ec34f9f64cfb9215238bee0ef5bafd8583203d68893934d4b1a66a1bf1f1af2", 0x3e, 0x5}, {&(0x7f0000000500)="992d381fbc0b0adf2d4a43b54ed5883a519ef7ee4f3a66cadb84003d3863477cedf003e72a0359ef989647840bd982c3e26aa61480e4c19adb14257cfd09758e74bfe4b2fe1b2d31afec73209876c8cec5eeff6da4bb0b2dc0d68869f94d15529087d39d04a75d54da6e8f8a2bb3bf2940f43c1c1701840593608a2ed9056f7d5e50b8655b46da40a8268201903f496862e50912e75e22faa3c21b12968229b5aea88658b1666b70203c48e700e2c2dd3d9b29c27b389da99678ec6e6eab129e43b65c2111269ea8b7c2d042c70b824385f41198bbdc5201ee0e66d62b7696dce9bd81cc0e6b7a6dcffff20a54d1120ff8fe7cfa7f", 0xf5, 0x6}], 0x400, &(0x7f0000000700)={[{}, {@huge_always}, {}, {@huge_always}, {@huge_within_size}, {@mode={'mode', 0x3d, 0xd77}}, {@gid={'gid', 0x3d, r1}}], [{@dont_measure}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_eq={'uid', 0x3d, r2}}]}) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x100000, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1653.594015] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1653.600917] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1653.608699] EXT4-fs (loop4): couldn't mount as ext2 due to feature incompatibilities [ 1653.614690] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1653.628242] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1653.634865] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1653.636472] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:32:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:32:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f0000000900)) fchown(0xffffffffffffffff, 0x0, r0) mount$9p_unix(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4000, &(0x7f0000000200)={'trans=unix,', {[{@dfltgid={'dfltgid', 0x3d, r0}}, {@cachetag={'cachetag', 0x3d, 'ext2\x00'}}, {@noextend}, {@cachetag}, {@version_L}], [{@smackfstransmute}]}}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1653.752849] 9pnet: p9_fd_create_unix (12111): problem connecting socket: ./mnt: -111 11:32:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="fecc43f4b5f7c154fea62469b9004b1f55d7faaf42ac71c9f71b9892d655b4330e773afbcfa0a0ff0af53f864d61b6a724b8e2e03501cca948a1def0d688302daeb0491d12ee42888f17ac3361acbb99d277c54541cdfa4e4594039dffd53c6a", 0x60, 0x400}, {0x0, 0x0, 0x20000000000000}], 0x2008040, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:31 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x20200, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) openat(r0, &(0x7f0000000000)='mnt/encrypted_dir/file0\x00', 0x200, 0x80) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) stat(&(0x7f0000000080)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x3, 0x0, r1, &(0x7f000000aec0)="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") setresuid(r1, r0, 0x0) syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x100, 0x6, &(0x7f0000001680)=[{&(0x7f0000000280)="c34d976da28b8e9ece4bc43871081662ed219600ec73ecac6e06a4e9eb3c2e19dabf4c71f26865ff63421c653ce6530d567a95de0714b07072b27c8ef11bfdc4e143dd4dd504f0663dd1d5d2387c50d2e1c135bc3eae8effb8599b040aa85cbb2712d482d1810967f5ac9f5f143b28eb9bcae7aa363dc5d453c5b635ffc77b1165a101b52b9672ca68e3bf2c6c7d262cb3ff38cff3954c6bf622d42262b0be95a0406b4e2c302d399b9cbdc1f0821103ce874a04b7c33f37de30f01d3fc40f05db59b6717417130fba6cf5a89d903b90becc863fed8f29b7", 0xd8, 0x7}, {&(0x7f0000000500)="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", 0x1000, 0xfffffffffffffbff}, {&(0x7f0000000140)="810d00634910f185df760304effcd1bdd34421654c50bf9cf7b25cc12a44011ded1ed2b37a822c27ab789fcd72456fed836985", 0x33, 0x7}, {&(0x7f0000000380)="3e246071f42915567152cf7cc3a03eaef4c1eec350a1067170db99fc6756ad5008416432be43dbccffed9b69d5537b02fc251a5cc665402a05c093327858dc156791dcd8278ab40146ee5af3617c1cd132970adcf900d3acd75e65c80a632fdd2cc5df6b8ce7c9aab84c4f8345ec17e12b8812993a489fb3ba3d641730ac88020ccd62424c8062c4996618345c75b6edc00bb3b665ea951dbb0c6fead9ca983582905f167c00974391afcf95333a4e6d9c138d2aa80bfec682e00bf7079fc9edaa94bcc743c703323b79c2256cbb8bed68801cebd097853e9f57d51aecf84b9ef697bede0de3cb2202fab9c38d0c", 0xee, 0xfffffffffffffff8}, {&(0x7f0000001500)="11ab1556b7f11a8a6533d7bb848522cba759a49f72c54db02200c90d5bb27a421d7fbc0ed5de72df4ab7aa861cd0f39dae443060e49394071a77af674d97f5e72b0890db1f8c8071af6a30badc3471b500801ae2ef453892bd36bccc7c7300393376f683bd8bf8772dc14f768f93e3511dd098c368563f90e06cae6948d06fb4f66e", 0x82, 0x100000001}, {&(0x7f00000015c0)="278de92a7539f41a2fa154c093f9bab9c45f22be73fb03775e631aaa96bda2fa27bb88c77e05e9c855b15bdcc487c3f1e894a3b3fe22894ea77bb615a10c4b1142cf695c09691c5df253662154fff8f218bd870842c342009c51df1a6fa6f875617c922e1739d5df1690bf99d2075fbb62e29dd8a6d34d0033bfadcb78c40f0e35c75e3a70a2319d5a4bf09af03888ebf4697bd3", 0x94, 0x5}], 0x80, &(0x7f0000001740)={[{'-'}, {'-&^\\\xe2\'('}], [{@func={'func', 0x3d, 'FILE_CHECK'}}, {@appraise_type}, {@dont_measure}, {@audit}, {@dont_measure}, {@euid_lt={'euid<', r1}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:31 executing program 6: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={[0x8]}, 0x8) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2040c220}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r1, 0x300, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40804}, 0x8000) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) dup(r0) 11:32:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffff800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:31 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x4, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="0c6e627dcf89c2e7ee40ea70ead2935b197de028066a7b1067e8c486781b1168bd91b77a8dbc663620b6eb650c3906381c4e28464bd742b0fa9ca323fe3cbce2d26193412051e8ab03c78be98132520de0b1d22a39b23165afb101ae7c26661f929982", 0x63, 0x4}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f00000000c0)="3ae133ed19428730805c0833d0a5015a3589b83c09d827175c6e2d1a88abecf33d9398c69c14e3cdedd292ac452012d10d6ea7fde2f0ba5cfc55cd5f78bfc67ceed5fcc79f572a54aa55c264fbe4fc1d08eefeed7e42337e9eec140913e372ba78713b09eb82e6542a19834db48dd12b8aae74edb0aff324df87fc4c61d262e8099729984c89f29e2889f1bc039591", 0x8f, 0x20}], 0x2351801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x401, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') stat(&(0x7f0000000440)='./file1/file0\x00', &(0x7f0000001580)) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='traOs=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="2c776626906f3d", @ANYRESHEX=r2, @ANYBLOB='\x00\x00']) r3 = open(&(0x7f0000000400)='./file0\x00', 0x101900, 0xb) getdents64(r3, &(0x7f0000001500)=""/64, 0x40) mount$bind(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='mnt/encrypted_dir\x00', &(0x7f0000000340), 0x800, 0x0) rename(&(0x7f0000000480)='./file1\x00', &(0x7f0000001600)='./file2\x00') unlinkat(r0, &(0x7f0000000280)='mnt/encrypted_dir\x00', 0x200) openat(r2, &(0x7f00000003c0)='./file1\x00', 0x505600, 0x1a9) [ 1653.887225] EXT4-fs (loop6): Unrecognized mount option "TIPC" or missing value [ 1653.910564] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1653.912961] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1653.928156] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1653.932091] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1653.950783] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1653.968401] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 11:32:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:32:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)) [ 1654.013121] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1654.026608] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:32:31 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_mount_image$nfs(&(0x7f0000005880), &(0x7f00000058c0)='mnt/encrypted_dir\x00', 0x0, 0x3, &(0x7f0000005b00)=[{&(0x7f0000005900)="e64a491b6c6a49863fd13b0fb565c7b91c36a438f65bb1ebe312e194723e7169dd9b9214532a94d8a1bcb3e680d775324765b18b038baaa805311562df45548b158b3a4816921855d38b89936b19d0a062189ec21c5e6d44c6043620cede54d0697137e2d601594faa7f8a0adaf7c92c8c86c3ae88eb88761cad659310bd77b6dfedabcbe08e0c103d22be65da92459fbaffc77f476793acb0cb713a88903c0b3a8d9e3797fda5dd", 0xa8}, {&(0x7f00000059c0)="8b33a7240aef068ee0ef5252c9825553ea7ea278303bd217fc50067108cceb523ac97dab348f094d60a4e796dcf97d040bdb1822628f4e15a02bdfa7aa06cbeccd5d86f7ced9b230d21646c4180721280b80d495fa6c0548d1ada9f83cf3d8ff8420214519bc0c4a3508c77b2700f90f21da1c409a787da812a28b3799765373733587e433f244011d08cf6a64309eea6374cff4c93737ec56639f048d282487228663d0ce4bb392ed913d00a237eee651d66ddf3a93ecede75e33737388a0", 0xbf, 0x3}, {&(0x7f0000005a80)="bb5e6f98e9b9fa08cf6dcd5049e1e24892c92a561a7597eaf9181093038b447e104d12f8c2cc67fc7da560e094465146381d69943985efa070398e570bb9eaf41a465f9569561ed55fbd63c696ae5feea717d8b13264af3a5c53357f5a44d580eebe15687bd1142a20d1", 0x6a, 0x59}], 0x14000, &(0x7f0000005b80)={[{'ext2\x00'}], [{@obj_user={'obj_user', 0x3d, 'ext2\x00'}}, {@dont_measure}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@obj_type={'obj_type', 0x3d, '/-.W,'}}]}) sendfile(0xffffffffffffffff, r1, &(0x7f0000005c00)=0x1, 0x10001) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x1c071, 0x1}, 0x0, 0x10, r2, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r3, 0x0, 0x20000010) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r4, 0x0, 0x20000010) poll(&(0x7f0000000000)=[{r2, 0x9404}, {r3, 0x2010}, {r0, 0x5020}, {r4, 0x2048}], 0x4, 0x101) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1654.110991] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1654.152797] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1654.156907] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1654.178992] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1654.202081] nfs: Unknown parameter 'ext2' [ 1654.225345] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1654.229777] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. 11:32:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file1\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x8, 0x2) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x19800bc, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1666.403336] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 11:32:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x460, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:43 executing program 4: r0 = syz_mount_image$ext4(&(0x7f00000001c0)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB(r3, 0xc400941b, &(0x7f0000000500)={0x0, 0x3, 0x91e4}) r4 = accept4(r3, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x80, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000480)=0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0xe1, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x1c071, 0x7fff}, 0x0, 0x10, r6, 0x2) perf_event_open(&(0x7f0000000400)={0x5, 0x80, 0x68, 0xff, 0x2, 0x4, 0x0, 0x100, 0x10c8, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x45a, 0x4, @perf_bp={&(0x7f00000003c0), 0x8}, 0x4000, 0xe6f, 0x7000000, 0x8, 0x8, 0x3, 0x4, 0x0, 0x6, 0x0, 0x8}, r5, 0xa, r0, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r1, &(0x7f0000000180)=0x5, r7, 0x0, 0x2, 0x0) accept(r3, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) dup3(r6, r2, 0x0) ioctl$sock_SIOCBRADDBR(r4, 0x89a0, &(0x7f0000000140)='hsr0\x00') 11:32:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) lsetxattr$security_evm(&(0x7f0000000000)='mnt/encrypted_dir\x00', &(0x7f0000000080), &(0x7f0000000280)=ANY=[@ANYBLOB="02eda96c6956b305e54e7ffa4f6b78ef8ac92fa9989909731af48a17d22ad9b03fe2e7fd3af47778959aa2ff4cd479bf8680d394b29c6582cb848902ec92a088b17e91d26c3fa28c893720652f7c9545dfc2ee2ac59f6dd20000000000"], 0x2, 0xabc85541e58301d7) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000140)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000300)={"709a1042e482c0678f8338bf9af29eac", 0x0, r2, {0xfffffffffffffffc}, {0x4, 0x9}, 0x3, [0x7, 0x6, 0x8, 0x3, 0x343, 0x3f, 0xa351, 0x9583, 0xcef, 0x0, 0xff, 0x7fffffff, 0x4, 0xfb, 0x7, 0x9]}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x7, 0x2, &(0x7f0000000140)=[{&(0x7f0000000280)="e10a77d7de963790bc0d6f57c425a033182f80f077d0b0616b35c07882719863ff711f79f560cdc4240747e0321c94eff63dd6d232c11a1d6d92bf46456c9ca1f1a8fa5c63bac19deae5b83d67b5f8d4f26e0bd8c55ef928171edc50b0467bf774dee7f8853d5c12f5e2224bfea1c0f3ae4002f6e8f338a2372455438d9622110c1510f66c3853b3696e9e94b15fa037dccd24f1324e9fcc05ed079c6844aa740b92ac16b4acb235205913", 0xab, 0xf5af}, {&(0x7f0000000340)="5888aa32617658ca92c566ffdc06ceb8a64f9afaf2a6a4547e2c74fdc35e0bb0984e8ca057521f3c5d552fc9b0d0b8c27e22a1355724052361293f55ba159d08584175c95da62905a7842fd8dd5d7df9eb7347de244f5124f5af5ce6d4c30da3f8c126b4e3849d0a290002277230d83d52f3a17b99541c3c0abb162b6f25880bab52ff28a4962c8195a61748f680962fe0a57ea7578cd8441858b71eb9482fe98a3be611d9e062b607b50965262601ec87ca6e2b788027a30fee7f55", 0xbc, 0xba}], 0x180004c, &(0x7f0000000400)=ANY=[@ANYBLOB="5e2c65787432002c2c65787432002c65787432002c2e2c2c65787432002c65787432002c2c7375626a5f747970653d65787432002c736d61636b2a737224af6f6f743d23252c68617368"]) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000500)=""/105, 0x69}, {&(0x7f0000000580)=""/132, 0x84}], 0x2, 0xfffffffa, 0x2) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:43 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:32:43 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x56) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x2}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000080)='mnt/encrypted_dir\x00', 0x0, 0x0, 0x0, 0x0, 0x0) finit_module(r0, 0x0, 0x2) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x16) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1666.412129] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1666.418331] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1666.422454] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1666.425307] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1666.428785] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1666.430042] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1666.431351] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1666.441532] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1666.441858] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1666.467003] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:32:43 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={@desc={0x1, 0x0, @desc1}, 0x40, 0x0, '\x00', @a}) 11:32:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000f80300000404", 0x9, 0x3}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x20ff}], 0x90000, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d619073f3ccf4b3acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33df697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000005fcbe43f062951cd61eb7fd89947c9213bca5dc0b89a2e850f5d485e58951dd7d1e20a61401a4a516c41604d7981f0c5d28db9d69e0604b270a1c8a29ab4b046f86a311abcd1aedb3726442528292ebb13fb2e320499e3d0ed0f624e2d941077db1120084174ca637e1c74bddecf39ecb482a0e075210ffa8c8a3f5cdf7889058aba3413d408c81d4c789c0bc1ded7e543a37a0ac8edaf7fbf979e986c22e25e82884240d5dc6aaab10fe2ee4df09527c6d9c18ef983eb5ffb44cdf9e7f785eb60881ee6632f2783fc485616db255f9b8730aff47c8629f4bf50f73351c37855a123b51042"], 0x98}}, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r0, 0x0, 0x20000010) fallocate(r0, 0x8, 0xf55, 0x5) sendmsg$NL80211_CMD_SET_CHANNEL(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)={0x50, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x7fffffff, 0x46}}}}, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xc}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x40}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x8010) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:43 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) openat(r0, &(0x7f0000000080)='./mnt\x00', 0x8000, 0x11e) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:43 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:32:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0xfffffffffffffe7e, 0x0, 0x1000a4, 0x0) r0 = syz_io_uring_setup(0x4d04, &(0x7f0000000280)={0x0, 0x67c1, 0x8, 0x1, 0x2b9}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000080)) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000004, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x1db, &(0x7f0000000500)={0x0, 0xda58, 0x2, 0x3, 0x241, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000300), &(0x7f0000000380)=0x0) r3 = socket$inet6(0xa, 0x80000, 0x8) syz_io_uring_submit(r1, r2, &(0x7f0000000480)=@IORING_OP_ACCEPT={0xd, 0x5, 0x0, r3, &(0x7f00000003c0)=0x80, &(0x7f0000000400)=@pptp={0x18, 0x2, {0x0, @local}}, 0x0, 0x80800, 0x1}, 0xfff) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000140)={'icmp\x00'}, &(0x7f0000000340)=0x1e) 11:32:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000200)='ext2\x00', 0x0, 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000040)="aeb76ea842bd806368412722fb743c90c60db498de298d9e0e108a8945623cfa796d21fd5afc18aea7461743202626d76f724f8611d92d946e79a0ac2e5c443b07a5ac8a974372560c2b6f39d8bc3a11ce77640544da52fe2c654a4284f6e7a1fac6fc976f8e1adf516503b22455ea5b57c73be2c31495d0201011de7122bf01e3253ff468b4caccd6ba884b2baf8a31704f496acb2c8bda", 0x98, 0x3}], 0x1004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1666.565603] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1666.609949] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1666.627150] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1666.629089] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1666.632164] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12222 comm=syz-executor.1 [ 1666.638489] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1666.645622] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:32:44 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) stat(&(0x7f0000000080)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x3, 0x0, r2, &(0x7f000000aec0)="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") setresuid(r2, r1, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) stat(&(0x7f0000000080)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x3, 0x0, r4, &(0x7f000000aec0)="e29c81868cf098b5db935e82def8ebba4340f5f7827499818e524fa68c4fcc74c43c89bed564811e98116c54e38f6cd590f3721b48d682fc26a000c5d7ca6ef1f262bdcb0140cc8e2fef70264e91373fd4b0c42a748c9a044c2b1c6c070000009088729f6a46e56ec4e039690e824cad226588109fd54f7cde39eb3d17af438ee2eeba7c399094660e0ccb0c2b80192d6706c82b3de4ee58efb0ed831ec9bba149b13e6c806648bab5a00274bf34db760bf67e77d456722200000000f4b08887ecac18e1c8b999145ea9394066d00416bb97b76082356973a75e856ca98fb5899407a4021047b401c96886ba5a4497d1001ae02a56174cd64a4840f4719b05a6e66ed6b2067c6a47e35d440623901fba5adbf498b60d207d5217564d72c0e48d61a32423a3bd649cfa681fa24029331730aa02e6692309e7268fb1f722c31083d8508c1082c899a3ec3ef470fab0af595d226267da7ac3a24cfc4115be3d9429bea4830ba7ab8204182b48fca8115c19dbd9e732f1c3f37e19fc9236ac155f58e86b4c1972db01a48e84632582fd8c478758dfed64819ff9a6771c5dfb74e153886f5d9a06fc239c27261d0a3ad646e94eabf77688799184f69e6729906bf05ef7eac175f4b6f2c198a547fb") setresuid(r4, r3, 0x0) getgroups(0xa, &(0x7f00000003c0)=[0xffffffffffffffff, 0xee01, 0xee00, 0xee01, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00, 0xee01]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000440)=0xc) fstat(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=0x0, @ANYBLOB='./mnt\x00']) setxattr$system_posix_acl(&(0x7f0000000080)='./mnt\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000540)={{}, {0x1, 0x2}, [{0x2, 0x6, 0xee00}, {0x2, 0x0, 0xee01}, {0x2, 0x3}, {0x2, 0x1}, {0x2, 0x1, r2}, {0x2, 0x3, r4}, {0x2, 0x7, 0xffffffffffffffff}], {0x4, 0x4}, [{0x8, 0x5, r5}, {0x8, 0x1, r6}, {0x8, 0x2, 0xee01}, {0x8, 0x3, r7}, {0x8, 0x7, r8}], {0x10, 0x1}, {0x20, 0x2}}, 0x84, 0x2) 11:32:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) unlinkat(r1, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1666.673444] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1666.680616] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1666.682989] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12237 comm=syz-executor.1 [ 1666.684607] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1666.690628] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1666.708840] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 11:32:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:32:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) listxattr(&(0x7f0000000140)='mnt/encrypted_dir\x00', &(0x7f0000000200)=""/30, 0x1e) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_ACCEPT={0xd, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000000000)=0x80, &(0x7f0000000040)=@nfc, 0x0, 0x80000, 0x1}, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000280)="597360612fc24e53716f3c9aa01ce2d698eccc333582d80cede875fbe837ad4d68a1cf5093080b49528fa1020cb268aeb1f2e95a9ef6f3d81d2c3f4c505dbbef5b2c9584a9517a0735c3bf6c458213681de67263d448412d2b46fb5c6e16ab574a94c1f8ec75b57aa08c318a1ff0d808e37ca870c660596dca65f0753f6e065c5d1cc1cd4eb943caed16", 0x8a) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1666.739243] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1666.760447] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1666.770961] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1666.821708] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1666.845674] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1666.857030] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1666.872197] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1666.972861] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 11:32:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x2, 0x10) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='mnt/encrypted_dir\x00', 0x10000, 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./mnt\x00', 0xc9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r2, 0x0, 0x20000010) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000140)={0x0, r2, 0x7, 0xef1e, 0xecab, 0x54ab6de8}) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') rename(&(0x7f00000002c0)='mnt/encrypted_dir\x00', &(0x7f0000000340)='mnt/encrypted_dir\x00') r3 = openat$cgroup_ro(r0, &(0x7f00000004c0)='freezer.state\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000500)=0xffffffffffffffb6) 11:32:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000280)='./mnt\x00', &(0x7f00000002c0)={0x22580, 0x46, 0x10}, 0x18) openat(r0, &(0x7f0000000340)='mnt/encrypted_dir\x00', 0x10040, 0x48) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_STATION(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000825bd7008fcdbdf2514b6bbd2ae20f3e24800000008000300dcc60f380000000000c4016185534101efd9316c29998734fb2e73470c8f1e7ffdf9c84357a0b61c191e3eb4fe74906481f618820cd229761c1c59617109be861dbcca16052d065c6999f53b3159e4342e39dd9aa2b21f6c45ee1da556900b79bace7f5f23e79e65b4f9286d94747857f4a99b0fb945a653baf16c9ec3aff667175f1bb5514760bc5c72da5182a5ca03000000000000002b94e71f40f425b7", @ANYRES32=0x0, @ANYBLOB="06003600ce0400000e00bd00090000e008000080ddff00000500190000000000060012000100000005001301020000000600ab000100000006001200070000000600b5001b000000"], 0x64}}, 0xc0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:59 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) r3 = dup(r0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x1c071, 0x1}, 0x0, 0x10, r4, 0x2) r5 = fork() wait4(r5, 0x0, 0x2, &(0x7f0000000140)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r6, 0x0) stat(&(0x7f0000000080)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x3, 0x0, r7, &(0x7f000000aec0)="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") setresuid(r7, r6, 0x0) getresgid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f0000000900)) fchown(0xffffffffffffffff, 0x0, r8) sendmmsg$unix(r1, &(0x7f0000002c80)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000003c0)="5b9de718580e9e178bb3f4d17597621610dd4e4abfd56f73108a92a1da99bdb27e7564e56c5817c7d02bc052d506085a7e48c7c9d831a397a1b7b94582f05cdd67186d086720c18f0ba814d050643ead1859dbee34babb2a2604517a93232ed66f7b3c1f2c68a2721c5f2bf0e5e4c4002025cd823cedbe017ad518c8c4bd068ae0230b7a27ffe9a88a9b9e9791995f1fb91f79ed85d5dd4939b774ccbeebec3aa9eab9e6f0728ce00eac818d82da07bcb37ca5ca61cc705377b5964b3e749c3d91357173d80d17254bab56f02dfe9a3b1167492b8b5b05", 0xd7}, {&(0x7f0000000500)="fadaefff26094bb97ebc91677ed0a81f298eca2e21814c2bd20462bd3f8055c003cde59acebbb7e0353477e59c1c42f950c527fd1013515ff10a3b45733428ab499a99a908b3f30038ff006ea79c30ce1e0096483726bc7750367e7197bc6686a83685c1d714a046bd09550982cd3cad10e8bbd1d06165790834c8e10ac3fc5da0b27b8881975cbfcd43e536eacb7bbafd90ff10d3fc96390eb8ae0ef56014ec3f46c527d2138f87aff264ef60b28d95136ef43fcf7c14e72b06bdaaf15f9f482779a668bfce3f4dd9df04ca475c71b66c2d3bc20779fb4d6698a712fb3e31318cd88849b6db6ab25ea7c98e8189208dd434a17b0752", 0xf6}, {&(0x7f0000000200)="7ec0ac52c957bdcd747c7e558e23526d11057260c8c22ebbc2563dd3f6022cf9b9fbaee00e9a400e4c7245742580a4e39d6578d035d82dbed4a6b154fe254a5792b8dd87ba25506040e7c49d1da0632f4d0fc555d1489e5568b68f73d78411ec", 0x60}], 0x3, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}], 0x88, 0x4000}}, {{&(0x7f0000000300)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000900)=[{&(0x7f00000007c0)="03b6832c3a40d9c57e538be384234aa6267f8ce87136dd9cb5c9c8091ca3c87660c9e066f1eccdfa7f6989582332ec424e0d5ed0aaf946fd1f28fd575c333499dd614d16de", 0x45}, {&(0x7f0000000840)="9b6867f2d6b9e449b68772ca4a10377163925603a6d2de56cbf78ad1826f04305b9d2aa650977b264273f8cc415129d2974e4a2338de77d5e52f8389d98c8e040532fb7d7d693c6191c0cabaef31d7119e6c108c13c1cca3791837eb32d12d13d75d2481eb4ecb7c6048d8737cff162c233a8b78967d53980789e0628d098dd0cca5dc618d409e972a2b16e451f930", 0x8f}], 0x2, &(0x7f0000000b00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000000b40)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000002040)=[{&(0x7f0000000bc0)="9eedb4ece241fe0ae929ba5b4bf490e82f9fe6b260b3514aafb0f8e5685b4e1ef6d04d3b0575e072b3f0fe60ffef07ac90a4e153909035294b3ea48b7d5298bc95559fae768e1708ffbce56d0d2c13686b86e9e575d2cf57112d6600452d5a0bffc68da12b81202c20544ac53e0595ddcd02a0ed96a3268019c551e30cfbe77e17f1b1a0a94d39c2aa25631bc8ffcc60dedc44ad565755fc74bbb89b4c9003fa7afc1833a3cbead11fce4f380f2e4737a5fa8843cb4f3bbf1a15f3145a2ac24f4613df73d6fab59651", 0xc9}, {&(0x7f0000000cc0)="3966e324bbd6f6403556b5d1098fd7eb2133579f5be3b3aa7ceed01b7cf6", 0x1e}, {&(0x7f0000000d00)="330ea4d456c3ca9c", 0x8}, {&(0x7f0000000d40)="228533e0b8e87a6af5c237ff00a18aebc93ee3d5571c7f553aa05f", 0x1b}, {&(0x7f0000000d80)="22525c21e667cf060cb5da6037e5a7feab34fc3b2ce5758bc3b4a16161d1b196227c44e07acd3a30eca3947312d140b0cc9a85ff80c10d06526ec90d0ca4ee5255e6066f319a70b4d2ef8d03cfa063b652f3ab7f3a4c3320d9647bf81c4630c467d364b4a055734594479409e234ee0be4c7ab96ec44712853", 0x79}, {&(0x7f0000000940)="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", 0x108}, {&(0x7f0000000f00)="36f36f9a80cff15c7efaeee5ec5d3f10c1cb7c8f019d028e73b62f54b5", 0x1d}, {&(0x7f0000000f40)="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", 0x1000}, {&(0x7f0000001f40)="4238e6a81f097e6431db36848bc902ad21922b5a3899b11832", 0x19}, {&(0x7f0000001f80)="be16123597c2a3293f364d298b0241d7e855aaea1bdb6010ffebc3517d9ff0c4793eb74a601c46c6efe4c749cebc3ad8c6b98d866c6a98ef270c3c6db68db9ed823445775dbb2b9a2d7ea4a22749145ca26d493b51e483f9d364272c6d6958ef27a3e7f3eb276494355a988f8e973bfb8d0566fb30fb1f90a6abb12d508ca69299015d7f043ab3cd5788b5b38fd04df71a84631c4821e4ed893579f2439d41e53550ba38595a3e5d2434151ed0f41c1a12ec6c325a484790ca", 0xb9}], 0xa, &(0x7f0000002300), 0x0, 0x40044}}, {{&(0x7f0000002380)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000002900)=[{&(0x7f0000002400)="cdb240c7fb131ea7f2f1e46bf76c6390a2dbaead8adbc2fb2997f706f787da364a0f34eeb660cebc099a49b25e6a98b347ecfcc7670136e251a078b76c32f49e98ff0f381bc3520637a2726f1e82d4dd375a84457e1a65e3777108c0d716ef07ccdc8293ba0fe84f09250aa444106a18db14572bf685c6f3a7e92a08e61673", 0x7f}, {&(0x7f0000002480)}, {&(0x7f00000024c0)="e204360a2075b1dbd3e5cecdbd32ec87302a2fe7d4e79e4853ebc20d200bece8", 0x20}, {&(0x7f0000002500)="3dba3a2e841f0caa50a1282c9046a4b04786cb3dfa77fc047d9c45a0e6b9975c400dbdfe899166e01459e02c93f6dd71649e0e7621751dbb279779df1f99b49bdca50c24af8e752668913e3e4fd824152b635a45849edc76eb4ce36f9f41b7b6bdf4ccd275e757fd077055304350828a39dceb6b7ad08f55930b0e772f0882dc166a652a1801a7ef47f6accc3a6adeaf8c46a254b257882a8effdcd180d322fd477f4eb7821a207f28a7", 0xaa}, {&(0x7f00000025c0)="692bcc8ea5a9e90177d562cc14678cc786674bc37f8ea81c977b0414d512de50cb301c105c0105702375e28ee44cc7a3b4575acec7ace3c4fdb947de0e120ba0fc62490376ec3cc24b2d3dc3b6f1e3ff53a19d63d730b1368569c5761b55396fe696e0d0711e040d9d5afe3750b8c743", 0x70}, {&(0x7f0000002640)="af6457bdb81e85ab3c1db627f34a00c38ee54b20e0095ba4f01cd0d092787ec9e544eff882bb8fef909fa1c41ebb7deb1073725baf7dcfe473bcdaa1a6f867ec9676d976d7818bc2fa21e6114255adcaee511396e46fe80980b2b26c08a3ee2fd56c01aec52d9d3e91a83b71926dda996472e8ee544d62b986bccaec65522757803d5754eedca1cd721a4b7a24cdb695", 0x90}, {&(0x7f0000002700)="400af899ee32696e29858e101ebe7211a0566407773d7ac2f267898191e3bb86852ff6cec61449c3c83f1e8739b6590e5f6f09d6bdce8aabb4c9d997a8fa467f1815b99b5246ee462dcef30399eb75e60bbf9628649848fb70fe6436180e6b9808c8258d35a2f9af104858369f05db16631477b536138e7baf4c0a83067ada6c3ed42be102d9860fd709f7800ae3039727f4c6d8286222095800bca7669ecde2384c6e7e9c109b8c8909c765bba64ba1f67bbc2720859ce86ae74aa9ae7361b3d4edd486095f40c1cdcbd9b2eed7ab4f9d274b50fd6261de4563e515", 0xdc}, {&(0x7f0000002800)="e32324e2e8c5d50b875a0a4708b63f7097987dca74ca4bc5fa19c5896752bbda83dbf2cb528c19558aebbcdc837489ed32522761f6a15e8799b179071949faa9de8b71e5ba9b824cf2f1fbea6698fb49e59e86d6e616bdc015fe331dce137f59aec1b7f73465bcaa5b2b87ebd7de2749fe01323639c4f97460b696fac0923f955fe78294f9f47900d5c2f665b0fa979c13b4a0432aa20bb4d8ffdb797446fc06e087868a5a431b5f561f63a36452ce27bd313c8d73c010ec92b0d46c418380d040597321049cde540608aca15a0b3ecf7e19bdb534f5b866d5fc70a0a7362dc450ae94d6", 0xe4}], 0x8, &(0x7f0000002b40)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff, r3, r2, r4, r1]}}, @cred={{0x1c, 0x1, 0x2, {r5, r7, r8}}}], 0x100, 0x4000080}}], 0x4, 0x4000000) name_to_handle_at(r1, &(0x7f0000000000)='mnt/encrypted_dir\x00', &(0x7f0000000040)=@reiserfs_5={0x14, 0x5, {0x9, 0x401, 0x101000, 0x7ff, 0xfffffff7}}, &(0x7f0000000080), 0x400) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:59 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1682.104685] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 11:32:59 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = syz_mount_image$nfs(&(0x7f0000000280), &(0x7f00000002c0)='mnt/encrypted_dir\x00', 0x401, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000300)="c617c270f7b3d46284b59622c1c5be45f6d3", 0x12}, {&(0x7f0000000340)="b07a9c68e1c86af368ba22ab37fa18ce1042ccf8c0dac6efa0856a61c6e8574522bf4b07b685817f6f140638643bcca8011989dfde052c0685d715f1b09e858ae3507485ab8a6ce1d8d995dc55", 0x4d, 0x40}, {&(0x7f0000000500)="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", 0x1000, 0x3b6}], 0x880, &(0x7f0000001500)={[{'ext2\x00'}, {'ext2\x00'}, {'ext2\x00'}], [{@uid_eq}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@fowner_gt={'fowner>', 0xee00}}, {@euid_gt}, {@seclabel}, {@fowner_lt}, {@uid_lt={'uid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}]}) openat(r1, &(0x7f0000000440)='./file0\x00', 0x2080, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x0, 0x0) r3 = open_tree(r0, &(0x7f00000004c0)='./mnt\x00', 0x80000) mkdirat(r3, &(0x7f0000000480)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r4 = signalfd(r2, &(0x7f0000000080)={[0xfffffffffffffff9]}, 0x8) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2, {0xffffffffffffffff, 0xee00}}, './mnt\x00'}) 11:32:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) creat(&(0x7f0000000140)='./mnt\x00', 0xcc) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './mnt\x00'}) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:59 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1682.121438] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1682.126395] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1682.136608] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1682.142478] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1682.146717] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1682.147632] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1682.148787] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1682.149783] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1682.158532] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1682.167726] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1682.173076] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1682.186366] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1682.190735] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1682.218573] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1682.235409] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. 11:32:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x1c071, 0x1}, 0x0, 0x10, r1, 0x2) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x40, 0x0, 0x0, 0xe8, 0x0, 0x1, 0x1000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x1, @perf_config_ext={0x40, 0x100000001}, 0x14, 0xe1de, 0x1, 0x2, 0x401, 0xfffffffe, 0x9, 0x0, 0x0, 0x0, 0xffffffff}, r0, 0xe, r1, 0xd) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x1c071, 0x1}, 0x0, 0x10, r3, 0x2) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x7, 0x1, 0x7, 0xff, 0x0, 0x7fffffff, 0x90000, 0x6, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x8}, 0x54450, 0x9000, 0x3, 0x4, 0x6, 0x92, 0x5, 0x0, 0x5, 0x0, 0x10000}, r2, 0x1, r3, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='mnt/encrypted_dir\x00', 0x761b40, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000480)={&(0x7f0000000240)=@phonet={0x23, 0x6, 0x87, 0x1}, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)="1279ac82ab6c22", 0x7}, {&(0x7f0000000300)="76b4731c02511ac7ebb04f6ca3d9ad707e60d2ce1d1b7aeb33e9d4aa0ce1aadfd25afdb02f", 0x25}, {&(0x7f0000000340)="966cecc35f3bdf961f9f3ba5536c09171bb7b2eb402072fb01081668fe6298f6fcf0f7cf215fb303990a772e6efd8ddea26a71e2d72408309a2484070959eabe32c5490750fdb07b", 0x48}, {&(0x7f00000003c0)="866c21eef357a47e8c514159d7bb399b466878807652c884af756cb4f994591030e393232307248d", 0x28}, {&(0x7f0000000400)="d523dd38f18c63ff3b9f551fd31d02b87aaab508aaaf", 0x16}, {&(0x7f0000000440)="019eaa337b0eada76b009c447fd9cad2a6a16489a5184b92312c44b471e6acb28adc1f7946c56b83eee3d4983840f872d938e383044b22c6", 0x38}, {&(0x7f0000000500)="dbe770aa5d6bf189c6b1b0031db25d3cb130c30b70928e1ab147dc4768c1daa25642f67d3f601f5029a93d48660bc5eb0e32e972c80635ff6bee7be2b2ae0f7b260e05de59edc71d36d65b01e8cea34220cb5f0c531f7cb0c550c1594bea5741bf3f7a37ca1a93e3fc7d53feb5f534c1f8d80905683c5f91640f16cfb5984383b9584a27aa8ee903559d0bfe15644c147e71c2469694e442001be14cd8478006fdace21dffb0204c69666e7f433cc7d0e3379896f3b1c1fc5023f3528e6f7f9229948fc0af6bc8f1a163108d2fbd7eaa3e73e50c7146", 0xd6}, {&(0x7f00000006c0)="222c0c5507c0386bcb2edfc0fb1d1f2cf3bbbc507552d45cf80ffcf7394d41a8da822a223755de1b85920fac66af308b76c21711a75ee03f94fab9708177a38ed2e98f6b843a8c3a451c177e29b956825af2a6ef9cd11669", 0x58}], 0x8, &(0x7f00000007c0)=[@txtime={{0x18, 0x1, 0x3d, 0xc4}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @mark={{0x14, 0x1, 0x24, 0xe0000000}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x1ff}}], 0x78}, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x1c071, 0x1}, 0x0, 0x10, r0, 0x2) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xfffffffffffbffff, r0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x800, 0x0) 11:32:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000080)='mnt/encrypted_dir\x00', &(0x7f0000000140)='openpromfs\x00', 0x3020008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:32:59 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x2}}, 'mnt/encrypted_dir\x00'}) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x80) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') [ 1682.338008] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1682.416799] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 11:33:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) 11:33:12 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) openat(r0, &(0x7f0000000140)='mnt/encrypted_dir\x00', 0x12040, 0x40) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x20a000) dup3(r2, r1, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000280)=""/149, 0x95}], 0x1) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:33:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x3}, 0x10006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:33:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000000)='mnt/encrypted_dir\x00') openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:33:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x200000, 0x0, 0x0, 0x40000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:33:12 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:33:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x1c071, 0x1}, 0x0, 0x10, r1, 0x2) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x1c071, 0x1}, 0x0, 0x10, r2, 0x2) close_range(r1, r2, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') openat(r0, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x20400, 0x0) 11:33:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r0, 0x0, 0x20000010) syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), r0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000600)='mnt/encrypted_dir\x00', 0x80) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000500)=[&(0x7f0000000080)='ext2\x00', &(0x7f0000000140)='ext2\x00', &(0x7f0000000280)='@,-{\x00', &(0x7f00000002c0)='ext2\x00', &(0x7f0000000300)='-(\x00', &(0x7f0000000340)='\xb5&.-\x00', &(0x7f0000000380)='ext2\x00', &(0x7f00000003c0)='-\x00', &(0x7f0000000400)='&-', &(0x7f0000000440)='{1@@&\x00'], &(0x7f0000000580)=[&(0x7f0000000480)='\x00']) [ 1694.933311] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1694.958517] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 11:33:12 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000200)='./mnt\x00', 0x1) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000000)='./file0\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) openat(r1, &(0x7f0000000140)='./file0/../file0\x00', 0x40303, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0/../file0\x00'}) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000080)) [ 1694.967155] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1694.983601] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1694.984473] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1694.985524] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1694.991356] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1695.004055] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1695.006250] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1695.007378] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1695.009170] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1695.026142] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1695.028973] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 11:33:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) stat(&(0x7f0000000080)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x3, 0x0, r1, &(0x7f000000aec0)="e29c81868cf098b5db935e82def8ebba4340f5f7827499818e524fa68c4fcc74c43c89bed564811e98116c54e38f6cd590f3721b48d682fc26a000c5d7ca6ef1f262bdcb0140cc8e2fef70264e91373fd4b0c42a748c9a044c2b1c6c070000009088729f6a46e56ec4e039690e824cad226588109fd54f7cde39eb3d17af438ee2eeba7c399094660e0ccb0c2b80192d6706c82b3de4ee58efb0ed831ec9bba149b13e6c806648bab5a00274bf34db760bf67e77d456722200000000f4b08887ecac18e1c8b999145ea9394066d00416bb97b76082356973a75e856ca98fb5899407a4021047b401c96886ba5a4497d1001ae02a56174cd64a4840f4719b05a6e66ed6b2067c6a47e35d440623901fba5adbf498b60d207d5217564d72c0e48d61a32423a3bd649cfa681fa24029331730aa02e6692309e7268fb1f722c31083d8508c1082c899a3ec3ef470fab0af595d226267da7ac3a24cfc4115be3d9429bea4830ba7ab8204182b48fca8115c19dbd9e732f1c3f37e19fc9236ac155f58e86b4c1972db01a48e84632582fd8c478758dfed64819ff9a6771c5dfb74e153886f5d9a06fc239c27261d0a3ad646e94eabf77688799184f69e6729906bf05ef7eac175f4b6f2c198a547fb") setresuid(r1, r0, 0x0) syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000080)='mnt/encrypted_dir\x00', 0x1, 0xa, &(0x7f0000001940)=[{&(0x7f0000000500)="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", 0x1000, 0x1}, {&(0x7f0000000280)="e892aee88849077c353f982101bbc8d1add51d553744563734445b810cb757ca321288d92ec7c1db1eb493a3ff6b5647c781a3509288076d4df501921ef33346f5e50497", 0x44, 0x9a}, {&(0x7f0000000300)="136fcbd61925409b598fbb9879fa8f5f1d0643561fe61a791804024e4963ebc8fb995f3df5997ef4edc410c71247cebda8382a9ae39415ab96db39acb14c959ac92177f39e93fe508023d3955a267447f530958231cbbed864c587fa2ca76719ca84115a1aa0dc499bf853e6922c2f9e8271a9472c07dae13b8c6b64135fba79934d1b5d7d089e69e4ce886057a3149f64641cef9a368c556976df65a8c03fab76ae7379c02b39e91279d0f02aa021727af8ae8cde2aa9918f76303a56ca8d77d9e30c10623827976b340fe5debfa66006cb0f44c06c75b2e7ea4b4282dab079fa3a6f57d784b8a4b7ffa0", 0xeb, 0x8000}, {&(0x7f0000000140), 0x0, 0x1}, {&(0x7f0000000400)="e55df20875d0f38b6082a9b2322b7cf539905fb2ce9130d4a24091f4c398142ed7db4306e9331b96fc9bedd5ae9dac7a29a5aeeffffb5e572113195b52069d9c83229792a3c12673cb7a61d12c2bc3d2f5b95e90679371eb31d842a8403840465a82b2600770e162b1b6e274ec94fb3bc2b9188a424095281cca91e7421398d70244bf02528c51ff04d9", 0x8a, 0x1}, {&(0x7f0000001500)="9204ddb995bb682abbd02392ef7751c5c544f8c54301910c041f681174914328b7a589cc44f707cc403027b13c14d40f256c1496404bff6d8621e158bc87b8afa7b6becfbd5eb1f30b9b1f1bd72c8631c71b36e8c8ba2f59a96becfa93500ec965d38f65a352011734a19486e1711c832b3c7e1b37d2fb08ab568767c71aae32a403d9187414dc1d0e6a31fc39a8b234d2b2606d9762deaac095c93919d04873325c50bd41fe4da984751b9d7078cb2ebd49ad5b564226d9c563ace45974eb9185b5b685d7081b59cf1295b697408566fe9949a3", 0xd4, 0x6ecc}, {&(0x7f0000001600)="c05412117e0db4378197d15c8cf0964a8426a4e186dba0d21db54886d506235fe94a137caa8bb7ebe298ef6db366e385d321289ea6da0dae07beba21a3b6c30cabeb3a8cedf5d883c3d7c3f7cdd7fc8b6fd01ebe53515552216d1d79c2a990fb663b540b9707ea922b7561031de527ebcc0e612f521dd9bc2efcaa0403ea5f8dded5dbba9b4de4aaca8f35c0567072b6b689a57f061417cbc2426d8aa700b16246234daff813e55fd93354e717ddf85504fc327ab3fc81243e5536029c31488d90f379136738a7a69e173647b0246512ca4ee2d64af8b05525", 0xd9, 0x72e}, {&(0x7f0000001700)="4bb2d753e215f3b4b8169ce45948838d2a867962689e028244c1328c7a16c5b067dbd4ab0188964cdc7516feccb4035bfb4599a4b0d36e6d80f9396ac0f03316a4dce433c1e537109b8d72a2a78281dcb73dd1fe8266436a1b997638d83f32b2903217c63e874967fa5ae4fd1d8f5d4c41fccf57893aa64caf8bc912bf44875a60ffe87a711db3555f8d5b809340263da798e806ee6bee92ecadf507fc7ed0eb1bc40d860477ff1f3df47b3b245322cda0fd9cdef1aee9f84735e7b39b6d5b1272c3fd1be40bf2691ec7bcd4c087b338e3ef431253e5fb15ad", 0xd9, 0x38d6}, {&(0x7f0000001800)="7530da7551d9c9b77a55ab2962db22680050090430da00322e789ede487a9cfac789c7c3c4fa44b99447ab17f58385d25c8d6b7b1b80314b16fe4b5da69f9b557f7608347f7e69e4c14dc8261dff3db256c11d5f85f6455e71ff1154193c43e74e35488a0bf07204997d39e071fa1f0a0c8749e4f5f5025e342c3837628e45ec585278d920b2dafc9ed7d87b5567915fca969f2769ca4fbdbd72a16fca4fb107d9210b02d89f221397e5e969e0", 0xad, 0x80}, {&(0x7f00000018c0)="b0bb6add53a2e8334fd3e9875a5b4653907bda1ea76f92f6d2bc8dc23220c3f3b788e6108daebb96d61fa2c872e1c51e3172236b8b1a66c418503d51286c2cc857b73bfcdcbecfebdad53ec946fe3292cb8a62b65eea0d1f12cddc71dbde793b3957965030", 0x65, 0x7}], 0x40028, &(0x7f0000001a40)={[{'ext2\x00'}, {'ext2\x00'}], [{@hash}, {@fowner_gt={'fowner>', r1}}, {@hash}, {@uid_gt}]}) [ 1695.091176] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 11:33:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='mnt/encrypted_dir\x00', 0x2) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:33:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$security_ima(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000080), &(0x7f0000000140)=@md5={0x1, "bfaf0a5d71ebf396aadacbc5ac4017d9"}, 0x11, 0x3) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x2, &(0x7f0000000400)=[{&(0x7f0000000300)="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", 0xfe, 0x4}, {&(0x7f0000000500)="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", 0x1000, 0xffffffffffffffff}], 0x10400, &(0x7f0000000440)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x7}}, {@test_dummy_encryption}, {@stripe={'stripe', 0x3d, 0xff}}], [{@subj_role}, {@uid_lt={'uid<', 0xee01}}]}) setxattr$trusted_overlay_upper(&(0x7f0000001500)='./mnt\x00', &(0x7f0000001540), &(0x7f0000001580)={0x0, 0xfb, 0xe4, 0x0, 0x7, "1f2189670b7285d16e27ad9993442d51", "6ed5393a0e413a83118ff1e4e998be3da41a85912c9abae5076533ffccc4acd50b6c37bb28cd858043004048f6059bea1930663547ee714040290a7b160ecbceff21113e5fe707a083e9fc8770d463cb9537341a4cf3dde2505141bc67c3e79da60df505fd3e77e202d4167c092025425c5c899d5017ffffa9b525c644a2bb3f0428244c35df39c8e1c8a1653541072179ba02da279eb30befdbd81b06ad3c6d42728abdd8b9b49cf496ec875b494fa7c27d21473fd4dbe9ea9dfec353cbb515b7401304e46166715c7a0f7095feb3"}, 0xe4, 0x3) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:33:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) recvmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/136, 0x88}], 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB="1000000000000000010000000100000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000006000074961c32de00000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x88}, 0x40000040) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x5e, 0x1405e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000300), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:33:12 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1695.165780] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1695.177908] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1695.189349] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 11:33:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(r0, &(0x7f0000000000)='.\x00', 0x60000, 0x102) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1695.214718] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 11:33:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x5, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffdfffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2ffbef762f6e756c6c623000"], &(0x7f0000000080)='mnt/encrypted_dir\x00', &(0x7f0000000140)='ncpfs\x00', 0x0, &(0x7f0000000280)='ext2\x00') chmod(&(0x7f00000002c0)='./mnt\x00', 0x13) [ 1695.241643] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 11:33:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000940)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000010000000b00000000019de1304dac3875f4df266cfa8384391a7137c954010fad9d1241cf25f2c44b8c2aaad63d63cb06ef4f10aa285bcb0e8585cd9aa0d32403d98994c163e6854faaf4838000000000000000e43d5bd34a8d15d6e01f559fa88dd242d1801caa4310ee0f25cfd954033a54a8a949051d505296148f5e6517ebf694d2a76ee60060b72b6960dbe7811cc5fbcbf8924c8cd9b01076", 0xec, 0x400}, {&(0x7f0000000400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000080)='mnt/encrypted_dir\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/917], 0x395) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000300)={'filter\x00', 0x0, [0x200, 0x7, 0x7]}, &(0x7f0000000000)=0x44) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt(0xffffffffffffffff, 0x3, 0x7fff, &(0x7f00000002c0)="b08b3d777c1bfb8ad3ca56feba2e0eb212b30a69746bac", 0x17) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x1c071, 0x1}, 0x0, 0x10, r1, 0x2) read(r1, &(0x7f0000000280)=""/58, 0x3a) r2 = syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x80) sendmsg$NL80211_CMD_TRIGGER_SCAN(r2, &(0x7f00000003c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000b00)=ANY=[@ANYBLOB="f8000000", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf25210000000c009900040000001c00000008009e00000000000500f600f70000000800dc000400000078002d800a0000000202e101020200000a00000002020202020200000a000000010101010101000008000000287dab0f1700000082d3f47852f2de823243807ab5a8ee0e4c6a62000a00000002020202020200000a00000001010101010100000a00000002020202020200000a000000010101010101000028002d800a00000001010101010100000a00000001010101010100000a00000001010101010100000500f600030000000a00f50050505050505000000a00f500ffffffffffff0000"], 0xf8}, 0x1, 0x0, 0x0, 0x40}, 0x4004001) [ 1695.254605] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1695.267736] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:33:12 executing program 3: unlinkat(0xffffffffffffffff, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:33:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x40008, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x401}, {0x0, 0x0, 0x3}], 0x4000, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x202001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x3}, 0x0, 0x8, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1695.294902] EXT4-fs (loop0): couldn't mount as ext2 due to feature incompatibilities [ 1695.297280] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1695.323402] audit: type=1400 audit(1717414392.768:16): avc: denied { read } for pid=12413 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 1695.329263] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1695.354154] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1695.362476] EXT4-fs (loop0): Unrecognized mount option "/dev/vcsa#" or missing value [ 1695.404098] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1707.364712] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem 11:33:24 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:33:24 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) execveat(r2, &(0x7f0000000080)='mnt/encrypted_dir\x00', &(0x7f0000000340)=[&(0x7f0000000140)='\x00', &(0x7f00000002c0)='ext2\x00', &(0x7f0000000300)='+[-#)\\#)\x00'], &(0x7f0000000540)=[&(0x7f00000003c0)='\'/\xa6\')-@\x00', &(0x7f0000000400)='@@--..\x00', &(0x7f0000000440)='{\x00', &(0x7f0000000480)=':]}:,\x00', &(0x7f0000000500)='9p\x00'], 0x800) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESHEX=r1, @ANYBLOB=',\x00']) openat(r1, &(0x7f0000000000)='./file0\x00', 0x8100, 0x1) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:33:24 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat(r0, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x181442, 0x178) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000140)=0x0) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='mnt/encrypted_dir\x00') fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000340)='ext2\x00', &(0x7f0000000380)='./mnt\x00', r3) r5 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xa3, 0xf7, 0x20, 0x2f, 0x0, 0x40, 0x10090, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x10132, 0x5, 0x194, 0x2, 0x5, 0x4, 0x1, 0x0, 0x1, 0x0, 0x100}, r4, 0xd, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000001c00)={0x5, 0x80, 0x7, 0x9, 0x3, 0x6, 0x0, 0x9, 0x2000, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x101, 0x4, @perf_bp={&(0x7f0000001bc0), 0x2}, 0x200, 0x2, 0xa3, 0x8, 0x400, 0x2829763f, 0x5c9, 0x0, 0x2, 0x0, 0x8000}, 0x0, 0x9, r5, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r6 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4c001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x5, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r7 = accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) r8 = openat$urandom(0xffffffffffffff9c, &(0x7f00000005c0), 0x8000, 0x0) r9 = syz_open_dev$vcsa(&(0x7f0000000740), 0xff, 0x10002) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="7472616e733d66642c7266646ee044", @ANYRESHEX=r10, @ANYBLOB=',wfdno=', @ANYRESHEX=r11, @ANYBLOB=',\x00']) r12 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000a00), 0x80000) r13 = syz_open_procfs(r4, &(0x7f0000000ac0)='net/fib_trie\x00') io_submit(0x0, 0x8, &(0x7f0000001b80)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x6, 0x8001, r5, &(0x7f00000003c0)="c901d535e355ecef3b8266ab29c3df8f676e5892cff858da1b68eb4d79cf4a6482beee845136615a114b4cbf9455ab24b8c7444580f7599da0b063f4ce1ad94e82205b907fb585a821d2992371584c13b67390214596b957ab956a9a89ba0ad6b839163aee4d5622abe16f0912cd479b26aa", 0x72, 0xfff, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x8000, r7, &(0x7f0000000540)="269bacd1504b1fe5b78e80bf77d899d3456b52661a67e2737a6096b2c292166749d268a4cb31208b086fe7f760b760", 0x2f, 0x5, 0x0, 0x1, r2}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x8, 0x4, r8, &(0x7f0000000600)="a3abf075b9517a1a0f884b89bc8aeb572103025b304f7840366b42b5eac1f5bf26d2082feb6faad79f2281d6fa1703db6580bbdd31bac59b5e531bd7cc89a1a51603cf1fc1d2147b15928d0a9b92b9d0d46bc7bfe35a02af26abc9b65136be421f9fe1eebef65491061c25b72557b5d5730826e6f0c92235397d7fee5f5b6dcb36932150787661508faf1f9f92096d9e4663765c16611368bb7aaaf4af0d5048f85a8ca786886bae30982faac455660483f28b748c1f241a2d0dbbdeea1a8d903d3b0cd134ec9530a234eaea8a9b2e5dba99a1145de6452ace39b920a7d961cbc99a", 0xe2, 0x3, 0x0, 0x0, r2}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x5, r9, &(0x7f0000000780)="c417b92574fd79dc4c9e40e4ce427b3c2b1bf27bd920e6698a63e6fbe360a3a4417cc97f061398079d2384f44f7e0c2edf7d", 0x32, 0xc8, 0x0, 0x2, r11}, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x7, 0x4, r2, &(0x7f0000000800)="10cdb7d0eb367fd2e2346de2633e8aac90b10e631a93a30820d2886eed170bf3be68d1ce31c1c91f627af6c7ce193f63b3b7219abaa5111c40d1e5b9673b7f6508a1acac122c2212c2dad3ad09e1b75be185508cc7f10649b43207de5428735e5bf6912240cef7c1b4c27298c386b21718d3d95fd1d6fe3c802071046e5027b1c37c5f283018d33c766cb293a0c95726f4622817eb729b3de6db8c546a3a1634d4f8", 0xa2, 0x7}, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x77f, r2, &(0x7f0000000900)="655b17e5d8eafdd713beb59065a31521c771c3a00147af53782f5b4320f6c75ae44fc93fa657dee2ebda9ecbcd5ad0b5cb71df17fa0bd3037c909bf1edc3bc45a7022217a84c37fcd46ad641f9d4d44e654d1d30398aea3fc054e9f31a938b99e68630156a02395d20ee09ca3b17b5fc0f4486f726b2b729b11dd4999812b789116d0f312da25185925107ae0029bc99fe9a66d42c465238", 0x98, 0xc23f, 0x0, 0x3}, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x2, 0x1, r12, &(0x7f0000000a40)="aea67d684eb9ecb7de31f571d1f302b85f344582f7e209cf0a230072807d18cedf22b7a947d5a8a48e2ca56ee3d5a1bf21356664e927068959cdbd92509d5d00b92c3620a7dc84cb55130e380d6fa5f9b7144c1b4fa4c49b2afa4b9b3cc8be417c695c3850e0eb415a94a10e050c954b45", 0x71, 0x8, 0x0, 0x1, r13}, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x5, 0x8, r6, &(0x7f0000000b40)="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", 0x1000, 0x2, 0x0, 0x1}]) 11:33:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x80, 0x3f, 0xfc, 0x4e, 0x8, 0x0, 0x3ff, 0x11000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x10000, 0x5}, 0x200, 0x6, 0x6, 0x7, 0x2, 0x401, 0x1, 0x0, 0x1000, 0x0, 0x80}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xd) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x10, r1, 0x4) 11:33:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rename(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000080)='./mnt\x00') mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat(0xffffffffffffffff, &(0x7f0000000140)='./mnt/file0\x00', 0x2000, 0x124) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:33:24 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r0, 0x8010661b, &(0x7f0000000280)) r2 = openat2(r1, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)={0x103000, 0x2, 0x1f}, 0x18) write$bt_hci(r2, &(0x7f0000000140)={0x1, @link_key_neg_reply={{0x40c, 0x6}, {@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}}}}, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:33:24 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/78, 0x4e}, {&(0x7f0000000200)=""/216, 0xd8}, {&(0x7f0000000080)=""/126, 0x7e}, {&(0x7f0000000300)=""/126, 0x7e}], 0x4, &(0x7f0000000500)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff], 0x88}, 0x2023) r3 = openat(r2, &(0x7f0000000480)='./mnt\x00', 0x400280, 0x80) openat(r1, &(0x7f0000000580)='./file0\x00', 0x24100, 0x0) writev(r1, &(0x7f00000008c0)=[{&(0x7f0000000640)="5ba648e1cfdd956732580fda1143bd1a2092649e84852373ebf48abb09b5f88b40d463a7b756d71440b21aed31db687ab87d84e79a6dfd23850a4c2cfd935b234d72419154d76ade9c8eb4480465a2633cc8d651146bce6365bccebde21da6f9ad8204ff8e7dc2e34eb707b86bfbf3dc9f1261f092a36279be3d32b7e6b707f8ebacaac8977db02b443e50474fdab7b87be056c0520a99f3ac5651f03438d8bb69eefffc2e1003f19edb5c3d8f65852ec5ca5e30897830ad24ca8cc0b39b77b1d42974b4538545a92a3dc09d5228a96d1f9d1e9c", 0xd4}, {&(0x7f0000000380)="a67f821f03ba2a7bf9ea89ec7ccdd2a820f81f71f3428e644d4edeaf4230567e44dc9ce71f946f4539e1b8ffb615f91e6694ccd973fb712e82f1295126bf7a41f8da7ca653d282ca5c4ccae5b6bd2c77ec9ef9ea1d5e3602f0e6a845c5a225f0e0bf91c36b7e4dc0aafa855a7b51a4d8ef2e4eb9ad3064f0e470c7e249f8a7e6312cefe38d9269e3fedebaf1e9cadf3b524449e7e9ff68fe94d035cefe63b5561407405c08a8c9a654d157", 0xab}, {&(0x7f0000000740)="aecda60229d7eed072ce25817fc6afd378e1858f825bf136b4dccaaa64bbb21ba1c6e7e51cc1e60c27a1e4ffcda36408aabb74e67ee1eb13f703d349eccaf641e314219f0db13fe66e5ce4922d37610d01d645a80da5673172607a15ecdf9c5f4fb686291b8b5cd6a84181b9c10f06a5c5d8c682cdea5c55c18d", 0x7a}, {&(0x7f00000007c0)="bcbf1969b66972ba503adcc7b0a76ea086e4e57f11809c9a3af550af06a4cdeeb73bee1eb512e3a97075908afaf5241c344a6204301e3e22f2ffc47fb692fac4b7262a307df31940c522f2a69530d0599e13fd1623d926ed6eb5611a394c8bb8a9b1278d0e198a3bcaf4d04f8404904258756eed532646cf05f19ff8f33e6833dd86543bca97c6212e8de310435ed2563f51ef78d252b14f55d5822b961c98c3101a863e567e1343ca6057d917189380b6d01eea042ba3b3d9a403b2204e6704cd32e1ca8e0a2cee364ce706d4a3e5abdc5c99a35cd25ed1c498f7ed6748913df5cfdebe", 0xe4}], 0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) ftruncate(r3, 0x7) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:33:24 executing program 4: ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000080)={0x7fff, 0xffffffff}) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400800, 0x1b9) [ 1707.401018] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1707.412075] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1707.421235] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1707.424885] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1707.430915] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1707.438181] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1707.447569] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1707.457929] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 11:33:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() wait4(r1, 0x0, 0x2, &(0x7f0000000140)) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x0, 0xb1, 0x2, 0xbe, 0x0, 0x10001, 0x50400, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x8001, 0x2}, 0x8010, 0x0, 0x9, 0x1, 0x6, 0xa4, 0x0, 0x0, 0x6, 0x0, 0xb4}, r1, 0x6, r0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1707.472734] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1707.481662] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1707.495029] 9pnet: Insufficient options for proto=fd [ 1707.496710] 9pnet: Insufficient options for proto=fd [ 1707.534107] 9pnet: Insufficient options for proto=fd 11:33:24 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) utime(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)={0x8, 0xa3c8}) r1 = syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x1ff, 0x2, &(0x7f00000003c0)=[{&(0x7f00000002c0)="2cb7b21c4c5ee502059375375f98bbadb7bb0252ed7fedf0278cfab9c32ada7cdcb0307f88579ca960d4bc3c82072424ec0b2e1c8199ebf7072d0bdae150815483a08a2e1060a7a063d53015b4dc3bfeea85aec968f6a7ff0cb8df9a66187fc284b9d6895768d79189f298cc6c65b54c9b5350c025b1fee87efe5a4f78ecb943d25c720a6811abe12214c89677dcb9bce5f4949c88460a712e2c6e5f0a99a56c066650932264191d74", 0xa9, 0x8001}, {&(0x7f0000000380)="2429a6978620838ffe4082565ef16cf8605975ffb4a31cb5460697c6b2a0738151b244a1597520568eade763f9533b39b54d1ec3da0e35", 0x37, 0x5}], 0x43001, &(0x7f0000000400)={[{@noauto_da_alloc}, {@usrquota}, {@grpquota}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@dont_measure}, {@permit_directio}, {@dont_measure}, {@func={'func', 0x3d, 'PATH_CHECK'}}]}) openat(r1, &(0x7f0000000480)='./mnt\x00', 0x20c0, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000500)='./file1\x00', 0x10) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x6) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1707.545477] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1707.579152] 9pnet: Insufficient options for proto=fd 11:33:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') statx(r0, &(0x7f0000000000)='./mnt\x00', 0x6000, 0x118, &(0x7f0000000280)) 11:33:25 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:33:25 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x11, 0x0, &(0x7f0000000200), 0x283400, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r1, 0x0, 0x20000010) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r2, 0x0, 0x20000010) poll(&(0x7f0000000080)=[{r0, 0x8000}, {r1, 0x2000}, {r0, 0x400}, {r0, 0x81}, {r2, 0x10}, {r0, 0xa90}], 0x6, 0xe64) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') symlinkat(&(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000040)='mnt/encrypted_dir\x00') 11:33:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:33:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, 0x0, 0x2, 0x70bd25, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x1, 0x60}}}}, ["", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4008080}, 0x4011) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='mnt/encrypted_dir\x00', 0x6) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x621501, 0x6) [ 1707.659146] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1707.673137] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:33:25 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') openat(r0, &(0x7f0000000000)='./file0\x00', 0x80001, 0x1) [ 1707.690004] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1707.694091] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1707.695110] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 11:33:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./mnt\x00', 0xffffffffffffff68, 0x3, &(0x7f0000000400)=[{&(0x7f0000000280)="9e7df059c27ae768dbe677c31fb03f8c7c808b2c16ede680602074d249824331db82bc712c736305ac87e2343f0f56a29e53fbc2965785c5326d1a9ed7df8fd9cde5e17f89e487916b3867a7f19c8fd114ba6f6bc8b8db09fb61be19db8c9f1795b7bd84b339f5f340da7d7b4e8d5147", 0x70, 0x80000000}, {&(0x7f0000000500)="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", 0x1000, 0x14000000000000}, {&(0x7f0000000300)="542df711ab13dcba7c97e08f0c37e036a7ad22234cf29aa1790487a78fa3bbd069594fffcd6ef0ccc9d1412c29cb44d67a0d48a95b4840ba9d5b1d23f9a5f15205672d68a31e2445150744a9f8865a93a150c2c7ab8e75209de4f9c4de342b14a7fdb70ec06aeed1248bf59ba15a1c674fa27984deb9b7616a807bebaeed3c4b22be4025c32131e16ab25b60199c6ccacfc96f564208d280babb642921dff3ba3f8509509914ea58cf09f64c076721b10d680e653bc1b5a716aac92b3ce252eb0aeb74650d363d8636bd0d80f0c9d05a45ee812f67542e67398a686ec255efc5a1eaa281ac5e", 0xe6, 0x8}], 0x10000, &(0x7f0000000140)={[{@nr_blocks={'nr_blocks', 0x3d, [0x36, 0x65, 0x25, 0x31, 0x38, 0x65, 0x37, 0x2d]}}, {@mpol={'mpol', 0x3d, {'bind', '', @val={0x3a, [0x39, 0x30, 0x32, 0x36, 0x31, 0x2d, 0x32, 0x33]}}}}, {@huge_never}], [{@obj_type={'obj_type', 0x3d, '&'}}]}) openat(r0, &(0x7f0000000480)='mnt/encrypted_dir\x00', 0x2, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1707.696890] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1707.704077] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1707.706146] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1707.708893] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1707.710880] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1707.745974] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1707.758312] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 11:33:25 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:33:25 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000005c0)='mnt/encrypted_dir\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000580)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed41000000f4655f000008000000040004", 0x11, 0x2100}], 0x2, &(0x7f0000000140)=ANY=[]) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) inotify_add_watch(r2, &(0x7f0000000080)='./mnt\x00', 0x4000220) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d619073f3ccf4b3acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33df697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000005fcbe43f062951cd61eb7fd89947c9213bca5dc0b89a2e850f5d485e58951dd7d1e20a61401a4a516c41604d7981f0c5d28db9d69e0604b270a1c8a29ab4b046f86a311abcd1aedb3726442528292ebb13fb2e320499e3d0ed0f624e2d941077db1120084174ca637e1c74bddecf39ecb482a0e075210ffa8c8a3f5cdf7889058aba3413d408c81d4c789c0bc1ded7e543a37a0ac8edaf7fbf979e986c22e25e82884240d5dc6aaab10fe2ee4df09527c6d9c18ef983eb5ffb44cdf9e7f785eb60881ee6632f2783fc485616db255f9b8730aff47c8629f4bf50f73351c37855a123b51042"], 0x98}}, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r4, 0x0, 0x20000010) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000540)=@IORING_OP_SPLICE={0x1e, 0x6, 0x0, @fd_index=0x9, 0xffffffffffff0001, {0x0, r1}, 0xdb2d, 0xb, 0x1, {0x0, 0x0, r4}}, 0xfffffc01) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r5 = dup2(r3, r0) execveat(r5, &(0x7f0000000140)='mnt/encrypted_dir\x00', &(0x7f0000000340)=[&(0x7f0000000280)='+:/-\x00', &(0x7f00000002c0)='ext2\x00', &(0x7f0000000300)='ext2\x00'], &(0x7f0000000500)=[&(0x7f0000000380)='ext2\x00', &(0x7f00000003c0)='ext2\x00', &(0x7f0000000400)='ext2\x00', &(0x7f0000000440)='.}.&&}\'@}\'\x00', &(0x7f0000000480)='\x00'], 0x800) 11:33:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='mnt/encrypted_dir/file0\x00', 0x7, 0xfffffe45, 0x0, 0x16a084, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x28000}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:33:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x80000, 0x184) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1707.869833] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 11:33:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d619073f3ccf4b3acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33df697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000005fcbe43f062951cd61eb7fd89947c9213bca5dc0b89a2e850f5d485e58951dd7d1e20a61401a4a516c41604d7981f0c5d28db9d69e0604b270a1c8a29ab4b046f86a311abcd1aedb3726442528292ebb13fb2e320499e3d0ed0f624e2d941077db1120084174ca637e1c74bddecf39ecb482a0e075210ffa8c8a3f5cdf7889058aba3413d408c81d4c789c0bc1ded7e543a37a0ac8edaf7fbf979e986c22e25e82884240d5dc6aaab10fe2ee4df09527c6d9c18ef983eb5ffb44cdf9e7f785eb60881ee6632f2783fc485616db255f9b8730aff47c8629f4bf50f73351c37855a123b51042"], 0x98}}, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r0, 0x0, 0x20000010) r1 = syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000200)='mnt/encrypted_dir\x00', 0x40004, 0x0, &(0x7f0000000200), 0x100008, &(0x7f0000000380)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r2 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x3}}, r2, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@mcast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private1}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f0000000900)) fsmount(0xffffffffffffffff, 0x1, 0x0) fchown(0xffffffffffffffff, 0x0, r4) chown(&(0x7f0000000000)='mnt/encrypted_dir\x00', r3, r4) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1707.883129] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. 11:33:25 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x40) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1707.894062] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1707.924012] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1707.925668] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1707.926568] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1707.927313] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1707.929119] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.4'. 11:33:25 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1707.936287] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1707.951912] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1707.957875] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1707.974273] EXT4-fs (loop4): Unrecognized mount option "mnt/encrypted_dir" or missing value [ 1707.988425] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1708.002855] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1708.016515] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1708.486966] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1708.488200] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.3'. 11:33:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat2(0xffffffffffffff9c, &(0x7f0000000000)='./mnt\x00', &(0x7f0000000040)={0x100c3, 0x1, 0x11}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:33:38 executing program 1: r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)=@abs, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000400)=""/13, 0xd}, {&(0x7f0000000500)=""/235, 0xeb}], 0x2, &(0x7f0000000600)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0xc0}, 0x40) fcntl$setownex(r0, 0xf, &(0x7f00000006c0)={0x1, r1}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './mnt/file0\x00'}) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000280)={0x8, 0x1, 0x3, 0x2, 0x4, [{0x4, 0x8, 0x100, '\x00', 0x1000}, {0x1, 0xffffffffffffff81, 0x8, '\x00', 0x104}, {0x1, 0x2, 0x3, '\x00', 0x4}, {0x800, 0x80000001, 0x5, '\x00', 0x600}]}) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, &(0x7f0000000700)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsu(&(0x7f0000000000), 0x5, 0x20c000) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:33:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:33:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0, 0x0, 0xffffffffffffffff}], 0x2a28004, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f00000002c0)={{0x9}, 0x100, 'mnt/encrypted_dir/file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xee01, 0xee01}}, 'mnt/encrypted_dir/file0\x00'}) perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x1, 0x6, 0x2, 0x0, 0x0, 0xffffffff, 0x4000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x6e663daf27d354a3, @perf_bp={&(0x7f0000000000), 0x4}, 0x1841, 0x5, 0x5, 0x0, 0x284f, 0x9, 0xfffd, 0x0, 0x8, 0x0, 0x45}, 0xffffffffffffffff, 0xe, r1, 0x2) 11:33:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) mount(&(0x7f0000000280)=@nullb, &(0x7f00000002c0)='./mnt\x00', &(0x7f0000000300)='anon_inodefs\x00', 0x3100020, &(0x7f0000000340)='ipvlan1\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x200) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x2476}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000140)={'ipvlan1\x00', &(0x7f0000000080)=@ethtool_link_settings={0x4c, 0x8, 0x2, 0x3, 0x4, 0x79, 0x1, 0x52, 0x3, 0x0, [0x6, 0x1, 0xf2, 0x8, 0x40, 0x0, 0x1], [0x5, 0x0, 0x0, 0x1d]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:33:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = dup3(r0, r0, 0x0) r2 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='mnt/encrypted_dir\x00', &(0x7f0000000140)={0x200000, 0x88, 0x16}, 0x18) mkdirat(r2, &(0x7f00000004c0)='./file0/../file0\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r3, 0x0, 0x20000010) write$P9_RREADLINK(r1, &(0x7f0000000340)={0x1a, 0x17, 0x2, {0x11, 'mnt/encrypted_dir'}}, 0x1a) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x120, 0x4) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r4, 0x0, 0x20000010) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, r4}, 0xfffffffc) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r5, @ANYBLOB=',wfdno=', @ANYRESHEX=r6, @ANYBLOB="1200"]) 11:33:38 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:33:38 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') lsetxattr(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000080)=@random={'os2.', '\x00'}, &(0x7f0000000140)='ext2\x00', 0x5, 0x2) openat(r0, &(0x7f0000000280)='./file0\x00', 0x0, 0x20) [ 1721.185679] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1721.194748] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1721.194991] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1721.208572] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1721.215629] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1721.231402] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1721.234194] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1721.234761] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1721.247747] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1721.249832] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1721.256786] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1721.263361] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1721.273051] 9pnet: Insufficient options for proto=fd [ 1721.288023] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.5'. 11:33:38 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1721.295189] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1721.312254] 9pnet: Insufficient options for proto=fd 11:33:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) stat(&(0x7f0000000080)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x3, 0x0, r1, &(0x7f000000aec0)="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") setresuid(r1, r0, 0x0) statfs(&(0x7f0000000300)='mnt/encrypted_dir\x00', &(0x7f0000000340)=""/64) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x1004010, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=unix,nodevmap,fsname=ext2\x00,appraise_type=imasig,euid=', @ANYRESDEC=r0, @ANYBLOB="2c654898781b0d41595f415050454e442c7308636c6162656c2ef9b193b223908aec3d3b68207e09cc965e98b1a6aa1cc51631b5bc9ee6307f7201578952f27abdd514ef107b43889b96272484e7ab12a97c53406f77a3d5da4778050019a8375000623cf4889cb5764c7451763ced54c28f855ff94856618bc7a6d6c18a572a2cb0"]) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:33:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rename(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000080)='./mnt\x00') mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1721.450855] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1721.469047] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1721.473216] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1721.495090] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:33:51 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0xfffffffffffffe08, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='mnt/encrypted_dir\x00', 0xfff, 0x7, &(0x7f0000001740)=[{&(0x7f0000000500)="ea1fa95e4810931557714054ab5b5d47bc17e8e0aabf5a104e5e46825d1adca08f2c2609401ebcd87653aa9bfc6adf380e36cb24b04399bdb4a3d4a0fd318da09ec3ff9db78ba6af616875002c51be293d92773b612eb7f10dcfcf41acd2380a8fd196987e233141cc12b64e34663d480b7ae01d861f28ffdf96d5c5955304c914a9c3a40a871cda071a821215a99a51018f7c91552fbe5c6fd322a0eb990a8de7b25f4d5123057bacc42e768cfabadf9ee2c18b72f8eb6832d6561228df8c94d00fc59ac956940baed8ac0c44382d21a550a1697932631d003c6ed04feccdf99e0eda8c731791bdb4884428847d9ea3f69a57d3393e4d02f278d23fbbd4488717bfcaf9ea5b91b6fc096e1e22c8229cc8a2bc49b2a307734c208b6e1a47eb9f8b2b27f9f3ca55f17bb6ca2824bc830197b1670db653cd1c2cf41238b7e10100599602be89824399f2c8aeae6005e5ca9423fdcf240d70426c5bea0941186ad2fc978eeee949cfa34195b1af17fa4ebae34d01e5622921ba02fa00da2d0dd4fd1d62477e7eec76b665ffba4490035725b288e7a1b95f49c5a3ffa5d901aa747332bf34b264daad9a65890a9f1004b169e61bacebe4c0c4816c690e63d8bd1f845a4f6bee543e43380908b75b0bdcf5c89e8e242609a7fd00873baff0b53bd368fe3d742d1f1bb48fb03ad30042fd581fc4b046981bb2e440828d83885005b8603b6f52905f767ed87f052850ef814b74a049177b9ceb1668e1a3d856d205f0cd5e12d9b7d6bc699232ef1ba2b120b927166425bc21d711707facbfe4f2ffd311b1662aa6a4392f450333f1ff71a0416f437985ea9b207995f4aac678266d3dcfea3e8146e0b723c7b4adaf95649e5f26eae57738ad43591d0187180ecaf49bdee6095642041f02970eac96fd450d46e333e987f7c218a92a5939a0b8751da4f6e8b1259e2d600eab2e1800d12bbfd3b106a9fa96e11bcbba6a35cbb672490e403a7cb42b0e1601919323b742ca15062afe3a6df10d7c3d22cfdece4daf10a5097162322ead2582051b094dc599508dd4f87bcfc95ddd772463d3dabe9a4c8a40d123fd98bc212e9005b1030f820ae55642fcfbc5894adeb0afd618512f7c151c8366e3e1d231f6c5418eaf1c8eff26951d007b53ea39d969cfa1c06a8e7e1a5835f0f099d4b394c6f8c4d4446290a2c9ac083a64e5f23b22bdd572add3ba27582e0d7370462dd6769f63c8e94149090571a68733e9e72b6fe73f1bcadc503eea5211de6b030234d4d4cbb03cca4ef633904d170d96d13b2f8c20e54ddf460d9f7a36a8107905b19cf208e701bd5ae83819e6814aab9da27b06182241e99592d0489498e3dfb0be0c501be4e3b1c003f18e3c62165430d0038b94fee54f9f13248d45b9ebde8333a2228a235e51063558915903ec8df7eb2504c0e34f6f0dc3c0942c2e33a30a78ddad6d73ebc34bb6705b7e0ee15880a29af91314dbcda28f40a6aeea4f03cc83e8b96632232d2444b4aaa88cec89d0317e00f17e6558626825d3922d9b6e9fc88aa3a2a10268e79dde087c880c4cb8f416537b4d25491af0dd39fe9999da63cabb28e625622f1e2ec8a14689105b5c96b71a77b99bee321668184b5e5def527a5d5f03e1cceb9577544e78ce00431472b48194b0a33b9d5fa899baf4bb46c6173f637e2057ed20b65119ff204430f29ba646b9810e6efb2ad2769a2c6101ce655628b6ae86e048bc7cb5c0cd452739cec094682aafd74c9feafbe57f673657c7deb0229143f39682460e143c7c0487ae8cdbc242997cf5fc1e09b6f8314c9ca21a3e04910f0f43bfca6a8ec20f4f6fc5e3127923e534d18cf0ed10a91df75a1135beb155dff1d4cd8d7a139ff8cc40ef53c687b4e133d32eb616ddd73a120bd54c874eb618b5e63760a1a25b8b79e6c32b5e7e603b4ef2286f020514452d7a49f9c7568bcf2f2e7133da34c322e4b8147a91403855df443ab22e85285c415221d746ca94489b14c73469939e4897c9bb49fe1f6d704b05edac453f11a3b3d7db6b7955d81234de670cb0d31ed9ad82e8d414d62cf3121579e55e8c6f677106693a090fa2c35777019c78fecd16492d3e4c9643818ad61f330e8e942bd1485c0ea38b45a5f5fdce7f2f3712f21639718654ff966f718a0036fd7cb625b581b624a195c3c400f3642e15048a01a4ceef17a83360467aa5a213075f0272a1c00d7c16fff75cd4a638c31a2d5026fe4dc85d9dc9bc97a57e04f95ad234ff7d7bffe211ddeae505e8682bbf0f19ca6431fe31da0d6a9d252579a6cb8dcfd5ff96f2c47199d16a2487046384ed11e76dc5d015430cdc315972be6e17e1c484c7ef68a1cde0c463657a23f8e55bbb72b12c72d122c9c42fedab043a9ac6972f0de760535feba021d558e8e3f529ce4c5e5ba8ee2ee7c67b212c25bba00b4a6df83c783e10bb3a385b1241dd1a2be89ccbc307be83b2c2aa91f56ee019e7d65bbd68c38a9d5077106c1f4d7382865d956ee6bb108f373ce9e1925d7619e92bce39dc50b1e9d21fed5d9140514ffc9dfa55a81d5c6a5a17d132fb1e36a5b031ec027333453f5fe1e626c3611fc9c82c489adb8ecd107e29a733214522bfffacb75d5515a70dbf5bff8a3b004b076f0fb00305298cbed41f8362fbe4873576084a1600d3196fdf9e7aad69e443105a4fdf246e5bd5d7eabcb79ff513f55094962edec7d705d3f461bb232d3f4ce92a81bc5007dfbb675595a59639a8da0fc232f685bd02bf58707fdce4d3e265db3d2222a8f4aa8cb2de4cdc70c88057e5fa3d137ad9a5a1b6847396aa509d5995d4cf6d52b151f2d050f39018a04df40ca05444de1ee5df044d460b46a6bda249ad861ff386240c89bcbee85b710dfab9c198004946c1278ae50f4e1dbffa6a27ed08047bbcc525c5bffe1300720a25b0dc6c046b5c11576579fddb29aafcbaafa37e473530b180db82e06bbd45f66fad5ef3fe91f6e9315956231ea401a1755ad2f2c2f1cfdc69a7a32fcc898b71fdc8bd94c532b92aca2282981f77c629fa8cc077ac1905187c4ccf25191f4f7deca213ccf19f32eb71d4cf46915ed7b92d22a1ba957ca72475cf8f8b073928269a1e1e2aff3850eaf098523b9a8dff6568ea288c972784eedccdc30ea5025e79aef2ab1322b89ab81c2584487063752b0445f6e1abd94aeee8ad92b6cc0869beb53b5a58965cba521fd394b3590b3c99334fc712057150ef08a8c97d34b64be05869e0dc940653da84f82ade934043550223870ef65bf134ef0e5060317b437a9a75715a0141f3fad5e000f8592641502551997938c8731a950928248ed1978a15a286ff3bb0f8bb4fd053924c8b0bb979f50af362e44c067969963f04b10278ba5e86a02b9f4180c53cc7918c5ecadcc1fa65b7ea6e4f1594253a53cb1b96fdceaabdac7a1f4d4b57dc2eb64bdd806e46b4cf5b66cc2e00fcf0fe767ab2a4fa782ccf5918ea914f32352a8f16423a732d0a2ece2d0562dda9c5b8d69d9572869adff273a397fb9d5dbb6b3dbb0fe7a18a08428a3891146f8f06e13be766766a7c98db25c072b14fc2dc0f4ed9f948b5a8e0bc17a99e3b76ba7468394a92b316a8f681bd98c27310487828a6620799b0bc968c028489b1df8c6245074e5cc19b3bfd619b88d00192eb7382e70b81199c106f44dfadb393e6ca26d49110f973355cc5a5dd5757ae521fe250336b358e39d4c229a6f2c2d405440c8e3ceebe9806723a8d0a3ca8a674905e78e45dc3ab6c9fa7678b1be7646746853bdb91ff68ef8d9d676a23467fa77b0e22157d751751ad722905e2aad1ce27dabd9a7491d4ef1ca5a8cdec5cb6605a52141d1b7c5319544a1e924ae7c7fbf6d664f718a1b4383bea9ef301e72f2c002b5ed84d64be6d125a579e8da9af78e92de1855c0b8cd4439dd4332a6a7c85445f4c739abf20a48d1d5370a16897261f526816880120e2d4c60abc4ffa892c0e0daf02c74af71c01d18318e51cb150dd0c86cea8c08147a367a9aebb1e42cd0510abb66ac388c5e032df0d74d2bfe9407e2a4eef7540ced76ac8db3b6706b2b95eda2d9c4c93a68424d8aa4fa846b7fbe96084eab616e7a3b49ebeac459d58fd6fea227c31149b2afa4884662ddd9583e1bfa960a03e46e1110268cd0fe13948467e9501d34f8e4026179f33966115b0a433b1e614002df3347165b6da65209f7b6d0a257f4a4de426980bb239632fcaf09219ce1df40e78daeb4a318c678c38be68f155e37e7633a1a2896151fdc4523a7f29f3e4628d18d007d2bedaf5075518e42d62dc79d28913f93b00596b787643d5c6253eb998d15c776b5b33b7ca5b49e27e59c3754eec029537c2b1d832f2c7e34d983ad191fcf34426b0e1b90e0c494942dd90610c4fe5f2e13fcf8ed2d3e64c931de12e045ebc57a07f252281c650cc0348372ae8ae9482727977ddc127219824bf50633b9d06e1706dc2b98f2f248fc28b8366d27d2fb723475e252abb4376387f3dcd4f998c96d05467c0c80905c8cb2b793c4fb626f0af1c60f5ac601cd78e8f7508ac54e6046ef6e2e980f801d79ee7754ed4f01dda63278adfaa2c2eb75bc8be86bd877231d5b458adf48e42d5efdc7a8a93b5df66073296f3ad127399f9f0bed20b139a0bc5cfe1f878d2754ffc9f0b350fff41d6e97c8fa91ce112b258be36cc957732e0e697b6bac6cb8a60f04379570ee3f0efc153222eaea0c041fb200efcb0398bf6971ff2ded85d509f31b157a7e3ec5392d2d0605aa33cedcea64d6964a5a923181c4cbc55d331205ae7523d86bb22b22df909174c41d42f675505681affafb850d16d03a4ecced724606fb76c640c201fc78d1f13969bb6f238820dca093927de73418a2b2a3b66f9e1fc0703ae8179990aa3135100463353b8406b4714b97e022c172213ae0b3a4973db221c8dd02d9153163d99e46a5885c255fd5df1898edc87a9c5e3dd1a1651348ddc5ab0b8d0f7970391ee30d54dec35901bc16ca4b848331614d03bf490089acc404c13312a3a3f5b30f6a91c062636109f38284371a68cc4e2af48974e1cd7d80983b1bc103d9320fbe584b65da32e0e3788cfe8ce3a204dbaaf676c09b197de9e842f51db1457e81cb63012dd7a931513e5bfb4f42550adc567b0bb201b3183c73ceeb8a35f1976b734cb1606e780250cd65718991d882cc0e1a88bb6adc1197ab7070244f01383453596b4b224bd9a404969575146cfa9462e1fe0e5f8cfc8e41919ef2b081e42d05cff1187f916c32a0c616ad8191930c595175013379cf06b53f6a83cf17ca3f5e33bd0a35f09c43e5db993b29dfe16d0ccc808f91a1145bccfda2140b223e5cfef9f20904fd0725a2cf33c4ea14bffc35af7369e1817aecc6a7792946764930cc03058cb1f980fd5eca1f93699302145b1eeaaf4a50eab5f7329461ed5ce17a48ddb764faae5965ec70b24ede6f1ebcdef73c68c4d80a998ca3eae4fd66db74167c2da0502a255b0a998c95da0e339e19489a662d9199f4a22e4018adea2df56e149c26d78d9684f5db3209989f6cf307e005676f72afa7c1ab948085b71ab5b6f8269ccb1cdcf152af092f8db1005621d93e754e3d614412336bde923163004e96a0daf8b46382d89c33d084854da97a38d206b6e4c544ae62f1497d122307d066946b7693d040a6a02aff90e5e7f48e1b212f504cec031a269d9b2792b1e2966687ffb319d1e0fc6090100b3f3ad11fa2a051a724bd87608ad6cd659445f50c3a12b89565882f6e024f595", 0x1000, 0x3}, {&(0x7f0000000280)="a13ffbba2b62bdce8a8ab06eba291b4730b6fa0b0851fcb722a57f93fb81a7f2c78437c2f00f80dc1b85e983dafec5c0b3c1dd9c6a046ff6f782ec81877c5b53e39fcfe3a2c4dbc3039cfc142f8ab18fcd98eab9d8736656a717a2858e9e7997df4551e3ec0019c45d2c", 0x6a, 0x5}, {&(0x7f0000000300)="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", 0xfa, 0x20}, {&(0x7f0000000400)="abf82507ab4f1877e1277bc0aa7a4e9e2cc0fb525ef0e0ea931d9de08ebdb94015ed0dda6c8a88a5c14539924a7b87430cde026309851927bde177130302495e6a283cdbf093f0ef8a0fb92f8b32e61173e3ea0725a3cb5952958f5ed1c24897e2aca36423b012f4c048c7ea470dc7e0324057e4de36b2275bb656f6d8bd03280afb67bd7e5ff98d67973177214c85805c14ec0a58a92007105daecc1ea02a512ed99c826f4491ad551cf48173986c", 0xaf, 0xb2}, {&(0x7f0000001500)="e7a3022d47fe600c7ce4e573f15ef49c48aea0bcaa8c706c9a9b512228c3c5d5707ffdbebb324d668b2bd72cc5dce2bcb40d2176676d35db078d12499b0da2786be265665c2fe64c9b29b9dc2aaa0929c8ba5cdd4d7987cdbe2cd4408c94d3f276a7e82f828817b8a39cb7f2d44b716766ef7080805ea15b04f1b11176689fb83072d5062a35345fb77335aa7aac0ba8c63779575854e6365f83ed9a079a86a4a4bf6db4d49194685d776c6d30cece271b2d21aac1612e9ddb5f774ab4e7dcce87f1b929d240f6c1e10a", 0xca, 0x40}, {&(0x7f0000001600)="7fd7e7cb78444c6104de3d6c09f1212b3963b5a5af225bde1e2a568c332ea27ea344a058e6639b203c8f00e8458ceb802b3412a676cfd73bde2b0c09f4142ef07a", 0x41, 0x800}, {&(0x7f0000001680)="e822fead5460a0eee00255440d22d812b2cdba3d853461e402f62353148cbd3e2a4f4c9e407deb226ba74dc0fdfc7ed33c8ddefb9ef8c6a858e5c12f0e672322b5f98dc46bf39e75430b76b10bfb53a71041b1c4ab0bc2faf2321d9a3ba1144dea44b31e3b16e3fc3003719fc3030e4634aa66d665180be26e7f616070f86020a8f31e12dc00bb1c3403912e848b98e91f", 0x91, 0x101}], 0x20, &(0x7f0000001800)={[{@size={'size', 0x3d, [0x31, 0x25]}}, {@mode={'mode', 0x3d, 0x10000}}, {@nr_blocks={'nr_blocks', 0x3d, [0x36, 0x6b, 0x78, 0x37, 0x32, 0x37, 0x33, 0x30, 0x78]}}], [{@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@uid_gt={'uid>', 0xee01}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfsdef={'smackfsdef', 0x3d, 'ext2\x00'}}]}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:33:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1020, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:33:51 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:33:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="e7a46f60098f044d4f1680630eb7ef0fe95df1c0167edac8f8906d409ef35116c2b33165185ceddf4ca6a6d51276e85e60e32a970907bcdc719069f95003970aedfcef51e725d611f6d19eff6535ee6a3eb7bcba7e26b259eedeec6d95c3d954939da94cc886cfabb1a728a6a01cb2d8a574f1b8810c7c888ef27e4bbdeadecd087fe2", 0x83, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(r0, 0x20, 0x233, 0x3) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0xa00, 0x44) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:33:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x1000000000002, 0x0, 0x0, 0x41, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x3, &(0x7f00000000c0)={{}, {0x0, 0x989680}}, 0x0) r2 = dup2(r0, r1) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x40000}, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffbff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000300)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') chroot(&(0x7f0000000400)='mnt/encrypted_dir\x00') perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x9, 0x0, 0x98, 0x2, 0x0, 0x9, 0x10, 0x6, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x982, 0x2, @perf_bp={&(0x7f0000000340), 0x4}, 0x11000, 0xbe, 0x7fffffff, 0x1, 0x0, 0x8, 0x4, 0x0, 0x15, 0x0, 0x1fc}, 0x0, 0x4, 0xffffffffffffffff, 0x3) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000280)='cgroup.events\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r3, 0xc0189377, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r4, {0x8000, 0x3e9}}, './file0\x00'}) 11:33:51 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x4000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:33:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') setxattr$security_capability(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000080), &(0x7f0000000140)=@v2={0x2000000, [{0xfffffffc, 0x1}, {0x6, 0x6}]}, 0x14, 0x3) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x1c071, 0x1}, 0x0, 0x10, r0, 0x2) write$binfmt_elf64(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/2752], 0xac0) 11:33:51 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) openat(r1, &(0x7f0000000080)='./file1\x00', 0x0, 0x1) [ 1733.994812] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1734.006383] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1734.007839] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1734.017090] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1734.019417] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1734.041958] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1734.042716] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1734.048823] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1734.048990] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:33:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$msdos(&(0x7f0000000080), &(0x7f0000000280)='./file0\x00', 0x7ed, 0x3, &(0x7f0000000400)=[{&(0x7f00000002c0)="f671868fb8e9e6739649c1711aea861b3fad320cf63b05b4cdf079b8c48a25a883e994f534cda0109ff0718ae86f153ac7da79ab9718537fd7f6ccbe7106ec93b5f44efce533e4d826b87c62c001028ddf5df4cc3a54f269ac9ef3e062e26975f2dacece30ba22f78bf1897b2b21ed5938482b4a7dbfb77226a65b48f68abf37520587afee2d", 0x86, 0xffffffffffffffff}, {&(0x7f0000000380)="4750f92a2d29a42aa720e704ff2bd49a9bc7c01d8e81e8aba4f56ae63a35e4754176f36169a41be57c904e1eca277f5f4f", 0x31, 0x1}, {&(0x7f00000003c0)="8c4bc42787", 0x5, 0x7ff}], 0x10000, &(0x7f0000000480)={[{@dots}], [{@euid_lt={'euid<', 0xee01}}, {@smackfsfloor}, {@obj_type={'obj_type', 0x3d, 'ext2\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x38, 0x66, 0x37, 0x64, 0x34, 0x61, 0x38], 0x2d, [0x37, 0x61, 0x61, 0x60], 0x2d, [0x37, 0x38, 0x36, 0x34], 0x2d, [0x32, 0x30, 0x33, 0x39], 0x2d, [0x39, 0x3c, 0x61, 0x34, 0x63, 0x61, 0x31, 0x33]}}}, {@hash}, {@subj_role={'subj_role', 0x3d, '\xf6-'}}, {@obj_user={'obj_user', 0x3d, 'K'}}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x31, 0x37, 0x30, 0x35, 0x31, 0x53, 0x61], 0x2d, [0x67, 0x33, 0x37, 0x30], 0x2d, [0x8, 0x37, 0x64, 0x63], 0x2d, [0xe, 0x62, 0x35, 0x61], 0x2d, [0x31, 0x62, 0x38, 0x39, 0x31, 0x31, 0x30, 0x30]}}}, {@euid_gt}]}) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x12) accept4(0xffffffffffffffff, &(0x7f0000000680)=@rc={0x1f, @none}, &(0x7f0000000700)=0x80, 0x1800) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa2}, 0x0, 0xffffffffffbfffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000580)={0x0, 0x0, 0x1, 0x0, '\x00', [{0x1000, 0x1, 0x9, 0x5, 0x3, 0x3ff}, {0x8, 0x7f, 0x6, 0x10000, 0x2}], ['\x00']}) pipe(&(0x7f0000000000)) 11:33:51 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x20400, 0x24) rename(&(0x7f00000000c0)='mnt/encrypted_dir/../file0\x00', &(0x7f0000000140)='mnt/encrypted_dir\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='mnt/encrypted_dir\x00') [ 1734.124242] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 11:33:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = fork() wait4(r0, 0x0, 0x2, &(0x7f0000000140)) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:33:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x57ce}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1734.259629] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1734.281900] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1734.380570] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 11:34:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) futimesat(r1, &(0x7f0000000380)='./mnt\x00', &(0x7f00000003c0)) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='.\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(r0, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x20000, 0x139) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) finit_module(r3, 0x0, 0x2) openat(r3, &(0x7f0000000080)='./mnt\x00', 0x0, 0x0) getdents(r2, &(0x7f0000000280)=""/239, 0xef) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') creat(&(0x7f0000000140)='mnt/encrypted_dir\x00', 0x0) 11:34:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) lsetxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340), &(0x7f0000000380), 0x2, 0x2) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x28, r1, 0x100, 0x70bd27, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x2000000}, 0xc000) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:04 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000000)="0200000003000000041a15dd3464aa6b25c938fc6a", 0x15, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0, 0x0, 0xf3}], 0x80, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:04 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:34:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000000)='./mnt\x00', 0x0) 11:34:04 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x8) faccessat2(r0, &(0x7f0000000000)='./mnt\x00', 0x3a9, 0x1200) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)=@v1={0x0, @aes256, 0x8, @auto="6c469c8793c434c0"}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x301002, 0x42) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') recvmmsg$unix(r1, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)=""/34, 0x22}, {&(0x7f0000000140)=""/48, 0x30}, {&(0x7f0000000280)=""/145, 0x91}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x4, &(0x7f0000000380)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}}, {{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000480)=""/30, 0x1e}], 0x1, &(0x7f0000001540)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x130}}, {{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000001680)=""/90, 0x5a}, {&(0x7f0000001700)=""/18, 0x12}, {&(0x7f0000001740)=""/126, 0x7e}, {&(0x7f00000017c0)=""/192, 0xc0}, {&(0x7f0000001880)=""/68, 0x44}], 0x5, &(0x7f0000001980)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x98}}], 0x3, 0x22061, &(0x7f0000001b00)={0x77359400}) mkdirat(r2, &(0x7f0000001b40)='./file0\x00', 0x110) openat(r3, &(0x7f0000001b80)='mnt/encrypted_dir\x00', 0x101200, 0x140) [ 1747.294374] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1747.299178] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 3709147652)! 11:34:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1747.300721] EXT4-fs (loop6): group descriptors corrupted! [ 1747.310441] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1747.314445] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1747.320574] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1747.322160] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1747.325662] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1747.327476] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1747.336345] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1747.340329] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1747.367882] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1747.389599] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1747.418949] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1747.431771] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 not in group (block 3709147652)! [ 1747.433403] EXT4-fs (loop6): group descriptors corrupted! 11:34:04 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'}) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x80489439, &(0x7f0000000400)) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x1c071, 0x1}, 0x0, 0x10, r2, 0x2) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='mnt/encrypted_dir\x00', 0xae, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="c59bf4c6e0ba7b2ee46694b9a71f5dcb3976280bbc2d5a", 0x17, 0x7}], 0x100090, &(0x7f0000000280)={[{@nonumtail}, {@numtail}, {@nonumtail}, {@utf8}, {@shortname_win95}], [{@appraise}, {@subj_user={'subj_user', 0x3d, 'nodevmap'}}, {@hash}]}) mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040), 0x2020000, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_client}, {@nodevmap}, {@cache_fscache}, {@access_client}, {@version_L}, {@cachetag={'cachetag', 0x3d, 'nodevmap'}}], [{@subj_role={'subj_role', 0x3d, '*!k#@/'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ']\\'}}, {@appraise}, {@seclabel}, {@obj_user={'obj_user', 0x3d, '))\x18\x95-zn\xec#\x90C\xb21\xe1)/\x00'}}]}}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:04 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:34:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) fsetxattr$security_capability(r2, &(0x7f0000000200), &(0x7f00000002c0)=@v2={0x2000000, [{0x1ff, 0x6}, {0x1, 0xa91}]}, 0x14, 0x0) syz_io_uring_complete(0x0) clock_gettime(0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) inotify_add_watch(r1, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x2) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1747.500909] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1747.511357] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 11:34:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x60440, 0x28) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x4, 0x80, 0x5, 0x80, 0x0, 0x2, 0x0, 0x6, 0x1201, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_config_ext={0x0, 0x3}, 0x2213, 0x8001, 0xffffffeb, 0x2, 0x1ff, 0x4, 0x0, 0x0, 0x8001, 0x0, 0x1}, 0x0, 0xd, r0, 0x2) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x1c071, 0x1}, 0x0, 0x10, r0, 0x2) open_by_handle_at(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="08000b00eaed040100000009000000ffffff2b15491ca1300434ccfaa79ef49cfeac74312c13522131823fd981f3d586273172560d833611473cd2ecc9705d903ac4028f1f0a3ef40bc83fbe7f7fa79bfb490bb121996944b2d557c56b4a91c4fd342882765736c744e3b83e2826"], 0x2) rename(&(0x7f00000000c0)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) [ 1747.564257] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1747.575896] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1747.578418] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:34:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) openat(r1, &(0x7f0000000000)='./mnt\x00', 0x4400, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1747.606158] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:34:05 executing program 6: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) [ 1747.660537] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1747.672603] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 11:34:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x1200}}, 'mnt/encrypted_dir\x00'}) 11:34:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, 0x0, 0x4000, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = eventfd(0x1) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d619073f3ccf4b3acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33df697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e66298d7220110693dd4d00d4a7b9a75298857b75fa243b23c8cf9643bb00000000005fcbe43f062951cd61eb7fd89947c9213bca5dc0b89a2e850f5d485e58951dd7d1e20a61401a4a516c41604d7981f0c5d28db9d69e0604b270a1c8a29ab4b046f86a311abcd1aedb3726442528292ebb13fb2e320499e3d0ed0f624e2d941077db1120084174ca637e1c74bddecf39ecb482a0e075210ffa8c8a3f5cdf7889058aba3413d408c81d4c789c0bc1ded7e543a37a0ac8edaf7fbf979e986c22e25e82884240d5dc6aaab10fe2ee4df09527c6d9c18ef983eb5ffb44cdf9e7f785eb60881ee6632f2783fc485616db255f9b8730aff47c8629f4bf50f73351c37855a123b51042"], 0x98}}, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r2, 0x0, 0x20000010) io_submit(0x0, 0x1, &(0x7f0000000280)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0x0, r2, &(0x7f0000000000)="f496b1", 0x3, 0x3, 0x0, 0x3, r0}]) splice(r0, &(0x7f0000000080)=0xffffffffffffff01, r1, &(0x7f0000000140)=0x4, 0x0, 0x8) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:18 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:34:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x2}, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = getuid() mount$cgroup(0x0, &(0x7f0000000000)='./mnt\x00', &(0x7f0000000080), 0x120d082, &(0x7f0000000340)=ANY=[@ANYBLOB="7065fa665f6576656e7c2c6e6f6e93fa4fa17072656669782c6e6f6e652c786174585b21976c6c2c68756765746c622c7569643ef6725e10b0c1d19f6cafc97b8dbe6767ca6603cc8d26ced5dc0f55a2690e", @ANYRESDEC=r1, @ANYBLOB=',dont_appraise,euid>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r2 = ioctl$TIOCGPTPEER(r0, 0x5441, 0xfffffffffffffffb) fsync(r2) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x3, 0x2, 0x69, 0x62, 0x0, 0x9, 0x2000, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0xabe, 0x2}, 0x51, 0x670, 0x0, 0x6, 0x7, 0x7fff, 0x4, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x6, r0, 0x8) 11:34:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) pivot_root(&(0x7f0000000000)='mnt/encrypted_dir\x00', &(0x7f0000000080)='./mnt\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) syz_io_uring_setup(0x3560, &(0x7f00000001c0)={0x0, 0x3, 0x2, 0x2, 0x0, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000002c0)=0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000300)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x1, 0x0, 0x0, 0x0, 0x23457, 0x0, 0x0, 0x0, {0x0, r4}}, 0x40) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001a80)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001a40)={&(0x7f0000000440)=@un=@abs, 0x80, &(0x7f0000001900)=[{&(0x7f0000001600)=""/76, 0x4c}, {&(0x7f0000001d00)=""/4096, 0x1000}, {&(0x7f0000001680)=""/189, 0xbd}, {&(0x7f0000001740)=""/3, 0x3}, {&(0x7f0000002d00)=""/4096, 0x1000}, {&(0x7f0000001780)=""/145, 0x91}, {&(0x7f0000003d00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/48, 0x30}, {&(0x7f0000001880)=""/118, 0x76}], 0x9, &(0x7f00000019c0)=""/107, 0x6b}, 0x0, 0x1, 0x1, {0x3, r4}}, 0x9) setresuid(0xffffffffffffffff, r0, 0x0) stat(&(0x7f0000000080)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x3, 0x0, r5, &(0x7f000000aec0)="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") setresuid(r5, r0, 0x0) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file0\x00', 0xfffffffffffff000, 0x3, &(0x7f00000003c0)=[{&(0x7f00000002c0)="02c295a5be5941ad66d238aff1301549383680ea30c57cd664730b753319065ecaed81a2c96ee421c6b2fdc9e38f3c82aa70706ca05c8f52c5f835d912874e4c05be7e22245b28e0f54a524fb5bc9ef04ad87decf957eb39b3b485ff4ebfefc56534cbcdb0799da9795549c93d08d19a94ad21881c85f54140df5b24d730c22fafa27afa6a5ea9207d28dd95024859cae3a7d9eafd1150923bdbdc44473183067ee026a4827ccbb2", 0xa8, 0x8001}, {&(0x7f0000000380)="0d34492d7c999d0237e455c20294c429560aaf85f40f36c090", 0x19, 0x9}, {&(0x7f0000000500)="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", 0x1000, 0x76dc}], 0x3101890, &(0x7f0000001500)={[{@nonumtail}, {@uni_xlateno}, {@utf8no}, {@rodir}], [{@fsmagic={'fsmagic', 0x3d, 0x1}}, {@obj_type}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x36, 0x62, 0x34, 0x30, 0x35, 0x33, 0x31], 0x2d, [0x35, 0x65, 0x66, 0x38], 0x2d, [0x35, 0x64, 0x3, 0x37], 0x2d, [0x30, 0x38, 0x5, 0x32], 0x2d, [0x36, 0x62, 0x34, 0x63, 0x63, 0x36, 0x65, 0x62]}}}, {@subj_role={'subj_role', 0x3d, '\xf5{:^'}}, {@fowner_eq={'fowner', 0x3d, r0}}]}) 11:34:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', 0x0, 0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000200)="f1e67d6e7940aaed5c815a8eaf9a2090ecdef17bf2afc595616a666b1d0363f39af58ef311e2b3482e2859515287fce8886260a693ab82d442895dd50d7b3f62bb7e0eaa9024b9", 0x47}, {&(0x7f0000001500)="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", 0x1000}], 0x100008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1761.156808] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1761.163156] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1761.164654] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1761.178785] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1761.189974] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1761.191233] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1761.203364] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1761.207216] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1761.209921] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1761.214197] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 1761.219058] EXT4-fs (loop0): get root inode failed [ 1761.219848] EXT4-fs (loop0): mount failed [ 1761.226802] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1761.245424] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:34:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000000)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x800, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffffff, 0x0, 0x8c080, 0x185) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000000)='./file1\x00', 0x10002, 0x41) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) openat(r0, &(0x7f0000000280)='./mnt\x00', 0x101000, 0x30) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x75253bef, 0x1000, 0x9}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1761.333793] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 11:34:18 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240), 0x0, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1761.362929] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1761.376060] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1761.386332] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 1761.388767] EXT4-fs (loop0): get root inode failed [ 1761.389524] EXT4-fs (loop0): mount failed 11:34:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80007}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1761.446623] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1761.473520] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1761.477790] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1761.504871] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1761.524438] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1761.560267] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:34:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) sendmsg$nl_generic(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000f40)={0x160c, 0x40, 0x8, 0x70bd27, 0x5, {0xb}, [@typed={0xa, 0x8f, 0x0, 0x0, @str='+U(*]\x00'}, @generic="e78b36ad7a6d0956a615e15651a51490b2083c15e24f57dbff539e953edd7ba650e6a812777ebd8b0a", @typed={0x8, 0x9, 0x0, 0x0, @ipv4=@private=0xa010100}, @generic="fe05cf44879659eb9c97c1f879efa492544bd493f551e53f81d21f629e412b130b055a2682e42913d264dad6d021c3e4f27e92db8ca7be348b57ba8b65d8829215ca12f05fc8f62119aaac8151c64d72fd76c15fcf37518ac0f481640d093d2b3d4cec9824686bdafef78a9afc3b16a90b", @nested={0x10b, 0x24, 0x0, 0x1, [@generic="e43709747d0bc60a5b0ffb17354b8825b9929d4ffbdc46db3bd68cba575262b6142d66d49f5de50fee73f23d8b90eba1ef9211724e419c45f6dc8d82c81c353edf2ae9fcb0a4b7d2c80433a0cc2454", @typed={0xc, 0x85, 0x0, 0x0, @u64}, @generic="7a794b618a9c24de22fe5a3e3dbfd512237edbcdafaf768b240bd112ffa8cd43c01fb03a46b1713fbde8260e19f0007e818e7def2f7a793409ac4a5d591faf71bede327caf0dde0db314eacb2ac77e21e10bc09926c30d1389dc04bee75cc2e6de7741ddbe4a2d7578a393f66be40cc98952255a00317e609cccc5915bd0fe2c8fddcc9fed3548f7be9d2bb05b70b5200c801ca27b578ef4912f236665ae7ad5fe8b19b30d5c5893fa85be87"]}, @nested={0x12b3, 0x56, 0x0, 0x1, [@typed={0xc, 0x3c, 0x0, 0x0, @u64=0x701}, @generic="1a226ea301ce074baaa72b34d22c7fe77bc7703164bf9065e212b9d7e8724402d2951c8a9b3eb5804f643d7b7b7154cc7417b30a19a683ad4ad7892f", @generic="23849dd9e4132a07821e46bbd9be6a0298182cb6f8021ac4de95ca45356725e0f470cf74d050c7c97ec2d255cfec42d88cb42f09ebf886218e165ffef071e9d2b8aed4c182d38b0c31ac4953c847d11864caf3823f57b2cd90d4473f6716e2afc15d2b5336437002e68da9a405f571b4515020ab11f797f277da8c7057e5a7a59221e1c30c21bf55ab95ffc93ebb60cadba2f0a93074df3264c4b3f30859e3415561a64a4e3f6417e4f8d307509ddefadabb922af263a30679dfcc2db5571aba5bd451ca3d", @generic="6d5ba9a1195023c34e60828d48a1f958a147e5bed43f41b2953804c31b92fe1d205b31f6f1e05df04fc8dcf02b86b3730108751ed019ca6d301250528a96d3fed50f00ebb695cecc2309938b4cd751b6986dc0354eea30b944355d23938585e2e113d4a9701e63d684ac43977803f194edd323a655a83984882a4cf763771097832253551e98bc954c31fa354b1ef8692e2f078790871de43be2a5c032efcd3df29ba5593f10e42570e10d659ae7b5b0c0cfb4b8bdf6f5f036e0ce0fdb8b70cbfb2325e9c97795186471545d7219ffcd08bf80caf3063a82abe6628ad0f382f3bc41c971da641cc920cda28409986cda8f87", @generic="35aaa7832ce1ec2a24e104a245a45d888656474938a0f0b872b50db00a865afc8a0543d0ce7d2508a030edead06a4c2383ba16b12151b7d078eb9117a619b90ad8cbb9ba839a27e9857e4179e14bcec2c815ce86a9c4fc75fb9f219e39fd13c28d4b0ae64577378d1bde9c613f98f4087a6a18", @generic="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", @generic="b146b7ba78821d12159047fddbea621b12e1b2b77bcb8fc4f33fe35d79ec18b3c2bd855ee9e9c80d20d0e6b1b616bb1f83", @typed={0x9, 0x8d, 0x0, 0x0, @str='ext2\x00'}]}, @nested={0x187, 0xc, 0x0, 0x1, [@generic="71d4d3205ac656751659150f53b33766fae023fe00d80ab3f6a7c7972deaa3c565ed22b096b8921532dba129936aecc0e2b4a4849872d91d4864ef1cfecd1359a83b769781a7de66de57749613828a7a86b817c0ae9609301475dc24ffd644293b184ecda0fc5adbf3534f78e10847f96f1b43f6345d2cefac4c87d905debaf58cc5bab042133fc036c3107a99b89c9d64083e1dfbbcce37fd06ba4dd31b571b58f1e011172d5947f14ed9da4e00e0c76548193183fbc2921403d192cd7c60", @typed={0x8, 0x50, 0x0, 0x0, @u32=0x2}, @typed={0xb9, 0x15, 0x0, 0x0, @binary="63dfc7f5bc179d36cda7af2a1edc30ef6bd5a710d51b1e9ed92d216b756ea4e31f209461c667f5021e32ddec4f63dd00a4d7476d947e18f3e8da4d123996b5c2d1d175f2483953f25f63fbbae3b1dcb5b15444e57c35eae9a0b28b408718e428214177b835a9a19bf12a283854c13b5d07d816645b4af14bfc9f29a6d9da45a8a1a33a1b46b27c32780024ce125e4b4eb3324efb1d3e5b704d751c9415f2f737e773902588c3bfbf5063938b55b842b32ffd6e1311"}]}]}, 0x160c}, 0x1, 0x0, 0x0, 0x48014}, 0x80) sendmsg$NL80211_CMD_REQ_SET_REG(r0, 0x0, 0x20000010) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:32 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240), 0x0, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:34:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000057c0), 0x1, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x1c071, 0x1}, 0x0, 0x10, r2, 0x2) syz_mount_image$msdos(&(0x7f0000000080), &(0x7f0000000240)='./file1\x00', 0x3, 0x3, &(0x7f0000000440)=[{&(0x7f0000000280)="70afa5a51d872dc63a5c4706c3e7239713c91233936ec715ce61c2641ddbfa8afc5d3305e150c642c2777172f84bc29780a8793ee392cc30c9d3b5ef0bf215e5ebbe8a3981277da4bc7d7fa27a2c1d4995d96823c01f206fb91a1a1a2a8d88efbca6f55e364063d25756cb390e6d21005c6ee0395072baf6c6ebeb591a629bfe8c343f491e073e2b1771f46ba85398b6de660096ed0feb6faf4453918a0c14f10a699288f67d2f782ce18fea5140300ef51b091748b18dd2fdfcebebb82add0666d90cf903db37743500c6f77f78c20c5d112463eb7d0fbbc511408e51be40d20bd76f9d246423b9c09235f2afb40344", 0xf0, 0x1}, {&(0x7f0000000380)="29423bd384", 0x5, 0x6}, {&(0x7f00000003c0)="e01be609a3aaa3abf990e451a214b39141a161d75928b2c05555d4010754c447038c1ddc6df739cffdfbfed1bc35d63115f92899501a8007f1998766fbb6fa53f4e81154539c", 0x46, 0x5}], 0x800081, &(0x7f0000000500)={[], [{@smackfsdef={'smackfsdef', 0x3d, 'ext2\x00'}}]}) signalfd(r2, &(0x7f0000000000)={[0x8]}, 0x8) r3 = open(&(0x7f0000000540)='./file0\x00', 0x50043, 0x1a0) mknodat$null(r3, &(0x7f0000000580)='./mnt\x00', 0x2000, 0x103) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000005800)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x2, 0xfe93, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:32 executing program 3: signalfd4(0xffffffffffffffff, &(0x7f0000000000)={[0xff]}, 0x8, 0x800) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000540), 0x2000, 0x0) ioctl$PTP_PEROUT_REQUEST(r0, 0x40383d03, &(0x7f0000000040)={{0xf, 0x101}, {0xff, 0x80002}, 0x401}) r1 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f0000000200)="df2581649b8f8aae67a878edc4a1d2f8c4fb98568668eef74382c4c2dbafcb7d21ae6d935722a2e7f2ae4c89c73ebd6b9da8cf9e42778590bed9836dd172991188f38d76af2f4ff557a572bafed056506532b325f4f29d4d79721857da8f8d547a8748ad34c4a92807ef6584c9a646fc8d356f2ba2063449e38748fe9a8e2f5d554fbdb044d4bbd9fb2021241dc81c840e07607f32d8ddf316b332bf23d9acff33c4b384329ae26083a8859ca274dd949eb0033aa38a94b0db24be07fd33d1be31bf019aae86", 0xc6, 0x1}, {&(0x7f00000000c0)="3a45ba15b16f49442809d8e6efa99cdec599b133cfddf995d0ca20", 0x1b, 0x6}, {&(0x7f0000000140)="ac96eebb5a566c1b5940f1f3791a6c88872132d1326fc08b0aa16d", 0x1b, 0x1}, {&(0x7f0000000300)="0fd89311124ed8f479f44e9df82cfcddd64b815860a8add405ef24d1413747f732718c1274f3904c6ed45a729ef5754e710e871ab39a10ab7706712ad0fdf93232752df24b77ddcc9be1bd53d41f42223d534058ea5b2e38c7970f45fd9a01e5ddd7e9ab459f", 0x66, 0x4}], 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) stat(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)) mknodat$loop(r1, &(0x7f0000000500)='./file0\x00', 0x800, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@ipv4={""/10, ""/2, @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000480)=0xe8) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000e40)={'ip6tnl0\x00', &(0x7f0000000dc0)={'ip6tnl0\x00', r1, 0x4, 0x7f, 0xca, 0x40, 0x8, @mcast2, @local, 0x20, 0x10, 0x591, 0x1}}) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f00000002c0)='./mnt\x00', 0xfffffffffffff411, 0x5, &(0x7f0000000b00)=[{&(0x7f0000000300)="cb054b372a9c671fb62d2e15b6453de122a7b68704795514afb2fc80d971dc0ec5d85bacd9e2d5c5054045389a109dcac2e3ebc765c636216e97af02aae4bb39a487ae2109213850dc125acc02cd5e730745c69e90af9d824313452d450d87708ef618a9fb21a1fd07864d8302494b7c55b3ec6d1b58d7bc46cf", 0x7a, 0x7}, {&(0x7f0000000380)="89f9f9cd0b5164a2ee26095a311c4993c44be4a1ef7a04a3435b3e90790f9808e0023e0675b69d9b30daf2589bb28a035e3757f79faef9aa6e63ae4690ce6c465f677dfdd02100de81b68a1b3261e40d315c533e9ecdeb106d26a2345992868c1cc9396099da1e0949c58a5285f63abf5d", 0x71, 0x20}, {&(0x7f0000000900)="2d382f987b928f6fb65ec7484cc2a8d9dd814da24cb6b6f77639f38257048be58af4e84b4532b5f2a91d8bfdb6b0af94e75ffc880f35b35b8f723296856fc196dbdfbcdf9785c4903d9f23862f64a8f425066008285a60241be2ca146e2c8566ed1f7e23be7c5f168247716fbc74bb3ff3f41a9c3e29ec8f491ea1d1f10c7391730f4a138bf514e3502e13012282cded86e759f8853f60728429db832777edc0245826a290461c7c8c311b52c059a585847e134caca821fd700182ae0ea2621f42e9e204a4b5e36697587a881b909bbdc650893135622dcf20aa", 0xda, 0xbd}, {&(0x7f0000000400)="b712a4c9c3c76d7eb104f02d5c2e3a51d15a7ba97a7bfa1fd771420b44f96525624dc8863f425b83c58f7065be029e8ad0bf02e7391612ff57cff9a38b69419f52ce2b1bfb8f7ea8432344a11553a7642d3d09e4685408bf397683904847fda35f891c7c06a4f74d6bc70929b14bc29569", 0x71, 0xffffffffffffffff}, {&(0x7f0000000a00)="d69d22663b0a78dad32da6984fb84ae9ca9c5a9b1d335d60466633e61afc9d861f6f713b1965d02861178498692cf467d73152ab2c84ad14d66ee1db4817653570b932d0986aa3939d0ced827ca6612c5f3ad2bac2f1b79aa9d50dbb0d3bce9e96d39ed3ca910583dba2c0caf992a37fb694f0e6218b355e5957a25081f02f37cfebeec150f06fe8a2be5b279c2bfca222359c4dbab1e6ba4bd6f0ad65b7e88254474c6beda749ead93b7ee780f1b1bd73a11cfe9c9418b065ab00dd37e10a7d6ffdd41304936cf7171e6a6436e734ff3551b02ea69ca28460ff876f392e4c9354906a444aad39ebb95ad31ec9eee3de43c0481b", 0xf4, 0x20}], 0xb40007, &(0x7f0000000c80)=ANY=[@ANYBLOB="726f6469722c73686f72746e616d653d77696e6e742c6e6e6f6e756d7461696c39312c726f6469722c756e695f786c6174653d312c757466383d312c7065726d6974068b41d023c5029e572c7063723d30303030303030303030303030303030303033372c7569643c", @ANYRESDEC=r2, @ANYBLOB=',\x00']) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={&(0x7f0000000e80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000500)={0x3f8, 0x28, 0x4, 0x70bd2b, 0x25dfdbfd, {0x1b}, [@generic="5f91758298357c8499cec57ca2e70b05c42e4a7514bbcf587d0f4a322ca99b1b931225900bae8cc25fc84c0e97", @typed={0x8, 0x85, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="9f62e70f39113b4df635b585343f48258f200c7036da8e681f00b5911c736d98ec93e1c4c8788363141c5fb5588b9188af74de7addc8f4a43f1c4d6b76445aff863bb7488611c00a74cf521cebc503446654c5b3680f4de0d675521cedb760917718014f8b66655ed892e5e8390908e0ce895d831973118d88286873ade67b9f8e9f5b2e9a45184ad14c855062c100f1920951cee8965fbd9ad2a96fcba13f27e4c8fb718d9cdcdece35e9ea88d36ea334e4b0758d2abb608e8207e9c21ec6871db124b2", @typed={0x9, 0x4d, 0x0, 0x0, @str='ext2\x00'}, @generic="917136d21ee2622393870560a2d47661256755b1062d011975bafeb5706e381a7c68f3b979923808db4137d705eb85611517e5bf961de1b3f9b28cec2b470b71885c24cf91718b53dfd532ae3a0f051ca7a52a3a2f1a0a75976a84a5a48dc6fce0dca0d1fd092575c27003a41a1b471c35f08a24435aff6e032a59a4dd6c86bafdb8b4b6c09012ebbc611f176d0c25f56b4399d12b6440e9d91f64c73415df7dd30f345e510f8c1a71b8d6d38bfd138f767b84e96f6ec5a6982b7b8d2ea65ec3f6526b62b3ea65cd47ad2f33bead33ef930a09adc416393622a24e40b1601f55f037cd8f", @generic="f8a4710835627529c54ce87a8cbbf973d521ce3220960841643b47812fd00fa696d0c916d76e5009e1cdf02b02e447edbb590990ddb3de81cf2e48bd13e154f1ecc1c08d13f8d5385c62c73343c67c1dd02203125c532424f2c7b1a37a68dcf40e138b280f8461c4900b5621a071787c91180d20a8c2f5df5e99b6f05d67d8b62608", @generic="b1521a885ba929af685d1aa638e0285429c45f4efa", @nested={0x162, 0x5b, 0x0, 0x1, [@generic="07c57cc0cb3805abeb7516472b0486ae377a7c5bd0f9abb9d2e0f65c5d47b8515a15daa8f65773487bb1c4e4a5034185476a77f0586b1fc306bdda3bebf22a01c9e6efe5d5b75cdf31060751924af2968783609cffe1eadf22163327ee8234c659b3afaabc5695a621cffabb02ac52d7bebff842395d7503b5246c20bc9d6dc0c0f236dba95492527c55600957d1bba8e0c01ff2772cadc6d48eb6b95d993075a6af4f0e6b0b268b48ca3f79bf2f64c1f8a94ac6871e28c2c6ce66dfefe98b2f0e77d6134bd2fd4ecc7074fc88b8404d796245550142284082d39c0f181d6ec37c385704c6ef68f78a69f12be0075f0183e96c96f14f62a2", @generic="f5e770b82d3faf267566dfc93f5585b0c0bb926b19401237041cef08971c77c8f51d5db2c0be3d962301fa33dad3dc568dc6e2ed5cdf2112ba8497287052a0268755a9a75ca18f87ade1e38f631e052bde654597086e50a1ed9d896e1c7044f1c4b2b2625fa2"]}]}, 0x3f8}, 0x1, 0x0, 0x0, 0x800}, 0x800) r3 = syz_open_dev$vcsu(&(0x7f0000000d80), 0x100, 0x8001) perf_event_open(&(0x7f0000000d00)={0x3, 0x80, 0xb4, 0xdc, 0x2, 0x3, 0x0, 0x8, 0x81420, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x100000001}, 0x2, 0x9, 0x4, 0x8, 0x7, 0x6, 0xa3, 0x0, 0xf9a, 0x0, 0x5}, 0x0, 0xf, r3, 0x9) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1774.870599] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1774.879121] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1774.886850] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1774.889081] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1774.890045] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1774.897591] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1774.898522] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1774.899580] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1774.911842] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1774.913312] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=64 sclass=netlink_route_socket pid=12867 comm=syz-executor.0 [ 1774.916792] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1774.920005] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1774.920082] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1774.933799] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ext2" or missing value 11:34:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000140)='./mnt\x00', 0x6, 0x6, &(0x7f0000000680)=[{&(0x7f0000000280)="48a369b09233fd7e8529399a5b0128530a84de3b7c02c5487616fe97b62a7364406fd64bcfb2b149028b5a3b82cf84ae5916c9c19149e727f2963c6b25f0b3dc77f2dd10355a2f5c07395c22084f477b5cc8ed72fbd5e9b9074c3c9a086a6739a623e9389ae31281a24af5123dda28096ffcc26b3d9404ded3e6961eb3287b83b995a949b0eb7cfb261fe53442fdd437167ae5d1", 0x94, 0x6}, {&(0x7f0000000340)="f794f2a60fcf44497712a414c3ccd903d614227fdd94fe373f627b25dad16169f1743f8e3c6f09a2891a2469aebfd2d44935b5ef93ac37288ea457333c4281b18fb4cad56a9840c2e658bb82c8e4ce880132d5e73c8b48d05e2be8984c798649f2438a064a3a797dd5620cf99c4c0724bddfb601162a1c4038647199be31bd1e5d44a0dfe88273a4a5b096ab131aea6d45259025bc6f6d574eb0ba11ea82411f024dfae7fa41e92309145cfc88e0768c0c63f437c7261d461d01eba09a1522edc34f114d1a38fedbab856df43a4c5571a310378254", 0xd5, 0x6}, {&(0x7f0000000440)="5fb3b621188bea890fc0f32e7b1994cc404b516ba61905b926889385e4a2d136a46f48f32c2550d445b5a829", 0x2c, 0xdb2}, {&(0x7f0000000500)="67db1404f0f9e01149c5bb3d740462a465a1bd7d42bae3a125c8ab1168bcbed6b47458428a12adcdbe81a1afdf0d78779f7a72d298560dcf8c7b9c5145b4d4c07c71c46cb0dad6e0847a02c15cb3dbacd07d26f2be1da0cc4575b470e26d144d30dd98aafab201acee72d937dd4bc154d9df23", 0x73, 0x1}, {&(0x7f0000000580)="90c3cfe2177bd54bdebefaf8659e29e5205c95fdb928b1169436a6ae92e64728b0fd3d75883087a473c5e2fd6659ae658216636be06d9688806b8fcdd950fe6925c34ebd49c47865589e173a57ae4ab66a504aed27ce849bc3c470e58c8656492eeb0ef1a3e80f99e32689b4bfc500bbbfd787bd9096cce1311866a3ba3ed12e3eddcc6bfb7c6dcc300ea21a24f80ad06525fcf8fee0dba18137ed2994c424cb67063387413ccd6e10b940adf877a6039b91a8876fe652382deeecd3c39949baa8c1951450754bd690ecb769b2735395a0e8273c49c6668b4008b628ec7af54746dbc432c7fd2cae122529fe801cf21f4716dad3e253dc6c", 0xf8, 0x6f81}, {&(0x7f0000000480)="278176446c8c5bd31fa543a1", 0xc, 0x1}], 0x20000, &(0x7f0000000740)={[{@huge_advise}, {@nr_inodes={'nr_inodes', 0x3d, [0x70, 0x35, 0x67, 0x70, 0x6d, 0x38]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x38]}}, {@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x38, 0x37, 0x35, 0x30, 0x34, 0x31, 0x32, 0x31, 0x31, 0x37]}}}}, {@nr_inodes={'nr_inodes', 0x3d, [0x25, 0x6b, 0x74, 0x2d]}}, {@huge_within_size}, {@size={'size', 0x3d, [0x32, 0x34, 0x37, 0x67, 0x74]}}], [{@fsmagic={'fsmagic', 0x3d, 0x9}}, {@uid_gt={'uid>', 0xee01}}, {@euid_lt={'euid<', 0xee01}}, {@smackfsfloor={'smackfsfloor', 0x3d, '*\x04'}}, {@audit}]}) linkat(r0, &(0x7f0000000000)='mnt/encrypted_dir\x00', r1, &(0x7f0000000840)='./file0\x00', 0x1400) 11:34:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x80040, 0x51) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2, 0x1b8) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000080)={r1, 0x3, 0x3, 0x10001}) openat(r2, &(0x7f00000000c0)='./mnt\x00', 0x48400, 0xcf) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="4d489e4cfca1765e29", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000000)=ANY=[]) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) openat(r2, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x1, 0x14c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000500)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x10808f4, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid}, {@mmap}, {@loose}, {@aname={'aname', 0x3d, 'wfdno'}}, {@debug={'debug', 0x3d, 0x4}}, {@nodevmap}, {@noextend}, {@aname={'aname', 0x3d, 'wfdno'}}], [{@appraise_type}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@fowner_gt}]}}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:32 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240), 0x0, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:34:32 executing program 4: sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="9c000080", @ANYRES16=0x0, @ANYBLOB="000128bd7000fedbdf25030000000c00038008000500ac1414aa0800040013000000380003800500080006000000140002006d61637674617030000000000000000005000800310000000800010002000000050008000600000008000400e70800001800018008000800000000200c00070000000000330000001c00028006000b000a000000080007000000400006000b0002000000"], 0x9c}, 0x1, 0x0, 0x0, 0x40841}, 0x4000) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x114}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x121000, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1775.075955] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=64 sclass=netlink_route_socket pid=12899 comm=syz-executor.0 11:34:32 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x17, 0x1, {0x7, './file1'}}, 0x10) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$P9_RFSYNC(r2, &(0x7f0000000140)={0x7, 0x33, 0x1}, 0x7) mkdirat(r0, &(0x7f0000000080)='./mnt\x00', 0x61) [ 1775.122570] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1775.143261] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1775.171550] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1775.175611] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1775.185349] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1775.203761] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1775.208221] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 11:34:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000040)='mnt/encrypted_dir\x00', &(0x7f0000000080)='ntfs\x00', 0x400, &(0x7f00000000c0)='\'+#,!],/\x00') 11:34:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0xffffff08, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x8, &(0x7f0000000140)=ANY=[]) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x9, 0x7f, 0xf5, 0xf5, 0x0, 0xfffffffffffffffa, 0x48000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x7, 0x69a}, 0x3224, 0xb8, 0x7, 0x6, 0x6, 0x1, 0x8, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, 0xffffffffffffffff, 0x8) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1775.231698] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1775.238261] netlink: 248 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1775.310544] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1775.339101] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 11:34:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) stat(&(0x7f0000000080)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x3, 0x0, r1, &(0x7f000000aec0)="e29c81868cf098b5db935e82def8ebba4340f5f7827499818e524fa68c4fcc74c43c89bed564811e98116c54e38f6cd590f3721b48d682fc26a000c5d7ca6ef1f262bdcb0140cc8e2fef70264e91373fd4b0c42a748c9a044c2b1c6c070000009088729f6a46e56ec4e039690e824cad226588109fd54f7cde39eb3d17af438ee2eeba7c399094660e0ccb0c2b80192d6706c82b3de4ee58efb0ed831ec9bba149b13e6c806648bab5a00274bf34db760bf67e77d456722200000000f4b08887ecac18e1c8b999145ea9394066d00416bb97b76082356973a75e856ca98fb5899407a4021047b401c96886ba5a4497d1001ae02a56174cd64a4840f4719b05a6e66ed6b2067c6a47e35d440623901fba5adbf498b60d207d5217564d72c0e48d61a32423a3bd649cfa681fa24029331730aa02e6692309e7268fb1f722c31083d8508c1082c899a3ec3ef470fab0af595d226267da7ac3a24cfc4115be3d9429bea4830ba7ab8204182b48fca8115c19dbd9e732f1c3f37e19fc9236ac155f58e86b4c1972db01a48e84632582fd8c478758dfed64819ff9a6771c5dfb74e153886f5d9a06fc239c27261d0a3ad646e94eabf77688799184f69e6729906bf05ef7eac175f4b6f2c198a547fb") setresuid(r1, r0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) stat(&(0x7f0000000080)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x3, 0x0, r3, &(0x7f000000aec0)="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") setresuid(r3, r2, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file1\x00', 0x7, 0x3, &(0x7f0000000380)=[{&(0x7f0000000080)="3ccbb71ad817b3c0515a688d83c01e585455c28b020c97a2d8af", 0x1a, 0x4}, {&(0x7f0000000200)="71c233d426a2dee9ea603b81ec2d707a16751a8b1ac96d7104bacbd878abccb050c3382a412a9c5275c5a6532f93c104d10d1c3ec3027c1ad3f662713f09335e2a4f105e23cd1d84ae163719a455f56b14c5662838df039176ffa85609aa8ab6d6a98bbe53b6820771eb3d08c4167645629b58079e967d73e7a7b9b319c179affc8b5e236867feebf748a8230a55ee597993269e8c22abba893ceb3a51f4b6a3a0215b", 0xa3, 0x400}, {&(0x7f00000002c0)="ffde79000ce86f65740221c75acd67ee475e766250cc5f25b1974d00e71493f8263a117a376ddecaa076456934a8d524b072067d5b9afcc6893cbb5a705763714314b08e3c0c868191bb2a6e4a8f31c7b030f61fd797c694478bf1ccd62ed1d0f1e8609e9b229e0599d45736304c07bcbe3da0cf6875229b8d2cee7969e39c11ecc512ff018194ef5d5d15d83cf1517ac8fca085f544ea568b4cf390586872ac43c2", 0xa2, 0x7}], 0x1010000, &(0x7f0000000500)={[{@jqfmt_vfsold}, {@barrier_val={'barrier', 0x3d, 0x1}}, {@max_batch_time={'max_batch_time', 0x3d, 0x5}}, {@grpquota}, {@grpjquota_path={'grpjquota', 0x3d, 'mnt/encrypted_dir'}}], [{@smackfsdef={'smackfsdef', 0x3d, '(].!{:*'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@euid_eq}, {@fowner_eq={'fowner', 0x3d, r3}}, {@smackfsdef={'smackfsdef', 0x3d, 'ext2\x00'}}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x8, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x1, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x3}}, './mnt\x00'}) openat(r2, &(0x7f0000000140)='./file0\x00', 0xc4080, 0x50) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:32 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1775.460344] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1775.473419] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1788.789595] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1788.795278] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:34:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x40004, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) fallocate(r0, 0x1, 0x10000, 0x1) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') getsockname$unix(0xffffffffffffffff, &(0x7f0000000280)=@abs, &(0x7f0000000000)=0x6e) 11:34:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) stat(&(0x7f0000000480)='mnt/encrypted_dir\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) stat(&(0x7f0000000080)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x3, 0x0, r2, &(0x7f000000aec0)="e29c81868cf098b5db935e82def8ebba4340f5f7827499818e524fa68c4fcc74c43c89bed564811e98116c54e38f6cd590f3721b48d682fc26a000c5d7ca6ef1f262bdcb0140cc8e2fef70264e91373fd4b0c42a748c9a044c2b1c6c070000009088729f6a46e56ec4e039690e824cad226588109fd54f7cde39eb3d17af438ee2eeba7c399094660e0ccb0c2b80192d6706c82b3de4ee58efb0ed831ec9bba149b13e6c806648bab5a00274bf34db760bf67e77d456722200000000f4b08887ecac18e1c8b999145ea9394066d00416bb97b76082356973a75e856ca98fb5899407a4021047b401c96886ba5a4497d1001ae02a56174cd64a4840f4719b05a6e66ed6b2067c6a47e35d440623901fba5adbf498b60d207d5217564d72c0e48d61a32423a3bd649cfa681fa24029331730aa02e6692309e7268fb1f722c31083d8508c1082c899a3ec3ef470fab0af595d226267da7ac3a24cfc4115be3d9429bea4830ba7ab8204182b48fca8115c19dbd9e732f1c3f37e19fc9236ac155f58e86b4c1972db01a48e84632582fd8c478758dfed64819ff9a6771c5dfb74e153886f5d9a06fc239c27261d0a3ad646e94eabf77688799184f69e6729906bf05ef7eac175f4b6f2c198a547fb") r3 = syz_io_uring_setup(0x3ac4, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f00000001c0)=0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x0, @fd=r6}, 0x0) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) syz_io_uring_submit(r7, r5, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, r5, &(0x7f00000009c0)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x2, 0x0, @fd_index=0x8, 0x7, 0x0, 0xfc7d, 0x5}, 0x400) setresuid(r2, r1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='mnt/encrypted_dir\x00', 0x0, 0x9, &(0x7f0000000780)=[{&(0x7f0000000280)="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", 0xfa, 0x8}, {&(0x7f0000000140)="59e0fd9aeea7d42f136887b2776e5352d090bbf9033e7793886d2010b8d00ad74d4caf4fb29e9285e88cf93380", 0x2d}, {&(0x7f0000000380)="b4bdab9095dde6526fe0255f8f9b8cb43fd21d570c38769eb7cf025bba3354791538c93e853860d242da1424ae4c8a7c0382898c555dcc745274ef810939096cf50e83", 0x43, 0x3}, {&(0x7f0000000400)="7203d687e9edfc30847d9db6f3eb237191d438475290c7e40599fdd0397234c1fa6ca5", 0x23, 0xdd}, {&(0x7f0000000440)="62f0e22a7c53016918", 0x9, 0x47}, {&(0x7f0000000500)="b53fceeaf5ab48e630f787a86724990e5d7057514699a88a8c308e2a419bbd04eef1ed35fcfaa7d1dd5061a93190c34466aafbf7bb94f9c51068ab93255b98f96701ff53f0ff384e854047086cc9ad3c", 0x50, 0x2f9c}, {&(0x7f0000000580)="5edcf476d9315fbbb779d75283f26ae64359de78639195c04ff58d3d6e19f5ce1e712d9d41397c39249c2ed1cc8c41100ff852cbb426d73915e3f190e8b85ea2db957de4944bb1d0ce54741cbe3f3a86840bf52558c6562f61650c9646837eed6c869c139d99269f7e48d4f340317d4178f4b19e69b3221d66c7a5cca850ebad5184d4f3b3f3c22bfa734f1804", 0x8d, 0x5}, {&(0x7f0000000640)="6e6537ee2e298553012b368b6942c2b5cebc12d89f09c8f8894c2b4213f4aafb63ba44aaef142390430b3bdd19ce34829f48cb2882b4a306d59acfbbdc22212f4d858268606e6ab4229469f7a98af7f5ccdd8afcbbc64a4c042a13703885feac94de7c8901feb9fe60a86326fee73c57900e983c60e54f08ea975b7810bed9511621414d47323a5a4999d9156d6e5295ec33cfb495753d0e2eb243059779d6e2abca375b7be9", 0xa6, 0x63}, {&(0x7f0000000700)="3c26f0670593f6e08c7f908d8db6431c2f5b039f03a05e0f6d1ffdb6cd0ff12b05de29d02e7dad155b48e51504d6f97fcf9361c17c82241017a7fddc0dd656da030e4ad882ac01545a0b7a6d43b98afa72aa82f51ee62dc7c92d3d5f329725987be9487a5c9c7a", 0x67, 0x1ff}], 0x1141038, &(0x7f0000000900)={[{@grpjquota_path={'grpjquota', 0x3d, './mnt'}}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@usrjquota}], [{@uid_gt={'uid>', r0}}, {@obj_role={'obj_role', 0x3d, '$-'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fowner_lt={'fowner<', r1}}, {@context={'context', 0x3d, 'root'}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:46 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:34:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./mnt\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r0, 0x0, 0x20000010) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x80489439, &(0x7f0000000280)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x1c071, 0x1}, 0x0, 0x10, r1, 0x2) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000080)={0x101, 0x8, '\x00', 0x0, &(0x7f0000000000)=[0x0]}) socket$netlink(0x10, 0x3, 0x8) 11:34:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) finit_module(r0, 0x0, 0x2) mkdirat(r0, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x51) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = mmap$IORING_OFF_SQES(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, 0xffffffffffffffff, 0x10000000) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r2, 0x0, 0x20000010) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x420000, 0x0) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x1c071, 0x1}, 0x0, 0x10, r5, 0x2) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x1c071, 0x1}, 0x0, 0x10, r6, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000140)=@IORING_OP_FILES_UPDATE={0x14, 0x3, 0x0, 0x0, 0x3, &(0x7f0000000080)=[r2, 0xffffffffffffffff, r3, r4, r0, r5, r6], 0x7, 0x0, 0x1}, 0x81) [ 1788.820866] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1788.834897] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1788.853065] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1788.854858] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1788.864796] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1788.867264] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1788.871818] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1788.875646] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 11:34:46 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2404c000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1788.886864] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1788.897674] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1788.919034] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 11:34:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) umount2(&(0x7f0000000080)='./mnt\x00', 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./mnt\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:46 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './mnt\x00'}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:34:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f0000000000ff000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000003000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200007b034da50af5", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x80000, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f00000002c0)='./file0/../file0\x00', 0x6, 0x3, &(0x7f0000000440)=[{&(0x7f0000000300)="40ed086361bbf8e6902af650a534ecef21df229c48a3b8dee2a2995e695112488e4a00ddedd2ed0dd8e8a41925e51e567561c94a4d0fd7f9934c6a583418c55586438d47abc60c736d20e0aa3fe01e1af1368c60b0d100d2cd97f543666f4fba264cf492a9f581518b1ab3dc78718c97ae7db0917e8a681b63ba84e507f84e0b17dc72afccc9b665cb7d9c6441fba09eb9b81bcd1e76e614858c1546351d24c74dcb6ff53577dfd49624d6695b35be76baa081", 0xb3, 0x1}, {&(0x7f00000003c0)="b24d8bb5591882bc544c57aa834160828a88b58b29740aa129f0564b9911facb40b9117d8a45fed427e4506cc72b4cde6d91aa40078048a3e43ec6b5772e7649d7debfea87e22f5c4ec0e067733eee2fb9669e7e5ae7964fe47bc2bb3479b96ee2137b194e33ec5f14a8c390cdeed14821c18383b28180e36667fccc20bd9d2e", 0x80, 0x5}, {&(0x7f0000000500)="4efd5f6bae6aa4ed5e139bb9a8301c3a45596a97a12618cf218534aa44bd4018b3da55e863b244dd842605b5e0a981427b2e2ad18a14a54de4eb4b1d4dc3b65a2327bbe70b07391d767bdced29b4eef8b01321be855d509718ac4bd68bdd00b2b2eefd2abe660ba953a2e483a971511b9d68f18e309ba3bd2b8f9710c65923b7b2d58b5fdbf084c30c1ff3cbc19716c52b", 0x91, 0x9}], 0x13b0800, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x4206) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0), 0x400080, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000600)={0x19, 0x17, 0x2, {0x10, './file0/../file0'}}, 0x19) unlink(&(0x7f00000000c0)='./file0\x00') ftruncate(r2, 0x0) symlinkat(&(0x7f0000000000)='./file0/../file0\x00', r1, &(0x7f0000000140)='mnt/encrypted_dir\x00') openat(r0, &(0x7f00000006c0)='./mnt\x00', 0x28c2a0, 0x54) mount(&(0x7f0000000700)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='securityfs\x00', 0x100004, &(0x7f00000007c0)='./\x00') [ 1789.016329] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 11:34:46 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) unlinkat(r0, &(0x7f0000000080)='./file1\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf}, 0x0, 0x10000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1789.048035] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1789.060788] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 11:34:46 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000000)=0x8) fcntl$setpipe(r0, 0x407, 0x2) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1789.091447] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1789.094169] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 11:34:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='./mnt\x00', 0x80) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r0 = syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./mnt\x00', 0x101, 0xa, &(0x7f00000007c0)=[{&(0x7f0000000280)="7bd2411d96cbc9b35d6f34200b34e56f69dcf4be85d9b2819c0c8861c6fb88007221c55fb04093366c8b067abb08dee13bd7f440c3da4c5bb05984c7332ab319b81e5c652baa0f610f170e3571499226a9229ed318aab52eb1d00ca61a59efc35c3751efb90b41e06e9249ba3a36ce00dc2b8f3362", 0x75, 0x1ff}, {&(0x7f0000000300)="555d52dd2aef56723ddef2326e847e8200742f750a6380938c45d0cc7ea4f8f48378e086a8e847da265cd474c83fc2b803c893c11fa0eecb469f1508395308ccd520f85207bb3278", 0x48, 0x8}, {&(0x7f0000000380)="232ce45b61da03d1fa00eeb2a7c729cfb1c3acc32589bbea3fea3cdfbe6a5ee194e33fa2e8ee3f6d538415b21ed0a1b6afd07b7a03a374b3680be205e935bb99b9641b75802beb4878be4fdc80d32c45df35e86a22cb60c813f88feb79d7ca09066432cc1e95ecd7115f", 0x6a, 0x52ce}, {&(0x7f0000000500)="867cbe00cae58d00400f11299a4535f96bdb420fb3b1b12a466e259c4ab4de24ce9ce98bd4d3ea208423ef8cc698fb23bbb208bda1a8b837ac34912fd21b4fe70367bc40edf00b0ab857e068325a6434b45b109ca789fca1472dad0b9bf98fc17bc443636988f58e371eb92253f9528495e3a0d1ce56e735ee71b3098e5fbcffd42ba46459c16e3d83e08f27dacd2674d83b464211196a36fb2a6ff6f3637e0914452974792d5eaacd83e11d92346e94ea7a4902d4829e72446c455f5ca6cc3a5ebb9b3b9ef3e5f6478f575d", 0xcc, 0x5}, {&(0x7f0000000400)="fcc1da69b92cf7fd8f106f355c318fc3b2f25eda871bc5eb2f2c43ea2fcf53411dc09939daf8d09c0e23b4c4e0fca5b069280a890dbe31ff4ac726530771cc0e713185e5d8e96b10f29f1518771701a60bc31120e54a52a20b0cb491d3e253759c0c71df72814b1f778d39b9c1826bf39cf40d34bfb1683c7010", 0x7a, 0xd4}, {&(0x7f0000000140), 0x0, 0x5}, {&(0x7f0000000600)="eb78c099df0520fdb6a10ad6b8774032451b2e95936ef9911b5801345278a8e5b030a3744fefe2b23de831f029a882096b8b4c3237079ae2367c28880129e4842cab51632fae8321034bd8ba7aac6f6b23d8896c95d9b6b94afadd4ec577659672bb177c3154705ea9f766b107254827f067ecdb4d87e1dab4fc1f4a4f5c2c7e1c", 0x81, 0x6}, {&(0x7f00000006c0)="96033640971b2a736bd010600289c4a0a405a2b1ea76afdcef6874ebba922b5a9f57a438da647f4dc59db32069f9357edb285aae75e0d0c5412af67c25351954366f1a948224740e14964363607a655ba091f4129031d8f477d65d34ab666e2bf8eab73d8b5184aa59574fad5a7d52578d8ddf9a903846f746da78c0e6c70ced299e8a9fe2161cdab6e5e39cdceeb8d1aee1e778fc", 0x95, 0x95}, {&(0x7f0000000480)="43cc7c3cdc2523de3f41e1d3eb567c0c908b6a74956681587b9e58538eb3", 0x1e, 0x1}, {&(0x7f0000000780)="8069695c3ee9605fac74cb550d1da5930667854869fbe5534daff8423faed831fb08e7ca5ee8f750fb1d0223c645dfe5d86510b4a8", 0x35}], 0x1000, &(0x7f00000008c0)={[{@nodots}], [{@permit_directio}, {@context={'context', 0x3d, 'root'}}, {@euid_lt}]}) openat(r0, &(0x7f0000000900)='./mnt/file0\x00', 0x200000, 0x42) [ 1789.112585] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1789.138760] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 11:34:46 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1789.198740] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 11:34:46 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x6) r2 = openat$incfs(r0, &(0x7f0000000440)='.pending_reads\x00', 0x20000, 0x21) move_mount(r2, &(0x7f0000000480)='./file0\x00', r1, &(0x7f00000004c0)='./file0\x00', 0x20) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') mknodat$loop(0xffffffffffffffff, &(0x7f0000000400)='./mnt\x00', 0x2000, 0x1) openat(0xffffffffffffffff, &(0x7f0000000140)='./mnt\x00', 0x180, 0xa) [ 1789.229423] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1789.237308] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem 11:34:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) finit_module(r0, 0x0, 0x2) mkdirat(r0, &(0x7f00000004c0)='./file0\x00', 0x45) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1789.249951] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1789.274314] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1789.312720] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1789.354741] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1789.375766] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 11:35:00 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) statx(r0, &(0x7f0000000140)='./mnt\x00', 0x1000, 0x400, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in6=@private1, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f00000009c0)=0xe8) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./mnt\x00', 0x9, 0x5, &(0x7f00000006c0)=[{&(0x7f0000000280)="f0cd686ff1955c92e1882c3993487351c587febec96ee6a7c4f56a184547d65095603ce06de9e65448d4ae1e761741eb4b1245e8e4b084a8d59e6eb5705b888ed753e614c85482031262e29e8af6d62d8c3efc6446692d198683b91b644228d2396745147629f35287c561e26eb15ac0b5e72b26da6212f4405cb7dc4b45e1a651", 0x81, 0x9}, {&(0x7f0000000340)="cd8622477687ee5b7d90eb0aac1d2439974cc46774986b130bba16d5015f44af5806069947cbb61ecc657c6f12e869499e80f4fcce7273158c6048d45fcd1fabefb26d8ad4628d98ce5ef36d9d63bca6e7424e5078061719733dd2e605a2b90a9c7e7e52ad5ea5661234a7c52dc348a83d08933fb26ccb77e3e4d7964c9d860706d814445cb4b2b105773b11453e8f7cc2c2ccf26f22247382233ca1369322aa53f29716db3f119fa37afe5b2ea5308e88f21377064eae382bad57d7840ed3f55be51fda37bf8279a5e44b414e5abcdfbcda735bc0a5889859d80a02", 0xdc, 0x4}, {&(0x7f0000000500)="7d7001f475747e29b19712e8a41d75c9281d796db241e2d0877c28aa257d5024c961ba525fadd72d1db5d9df0657a39769137f0ce4654e51743b7e576049117e1ea57d35e52609b0212cc16de41dbfbd723331aa0384a28b167c0f55ec93a0286b3963286a758a67d90262640b12c1d119b7cb5470ae6def2708fa2e3dbb21cd9c68c9956ca5f2137189c5bf18bf5041b3c2c8800fa443ba6af4e8e9", 0x9c, 0x3}, {&(0x7f0000000440)="c61de37d88a912802fb56dab67bb33d4756e9abe19a497521926623f40ca5f9af666488b8596bacd1dad18bcae32e8161ed7d2fb1bd37d57a081add7cbf4afb80c749c25a3eb38ca06", 0x49, 0x3}, {&(0x7f00000005c0)="4173460d543dd7abed9d68e81407a333f64e1f5796d471c0d806c62e3fe2c447528ad6b15e979b7d663178cb93403f5e64b9c487cab43701d07fc3eb069524ea492ab394ebf57137dcf1693a42215feaad992361b298dd6997dee3022de361cd506f4d6c1d264a1f13f5aa7ea12c248df260ebafc966788f0395484a7c74b01b0a79d3465be3649e3e3191350847a0a627d10099779c452c33c68a80894235d3dca127bbc715d0ce74171ec6e9897e78e64d7521b2cd525e31878e4c8b9f37095f527e2b52e876322b1f68db353c1dc16c43cc8d2bb70754f80069b190b8d176b36a", 0xe2, 0x2}], 0x840080, &(0x7f0000000a00)={[{@mode={'mode', 0x3d, 0x5}}, {}, {@mode={'mode', 0x3d, 0x20}}, {}, {@huge_never}, {@huge_advise}, {@huge_never}, {@huge_advise}, {@nr_blocks={'nr_blocks', 0x3d, [0x35, 0x34]}}], [{@euid_lt={'euid<', r1}}, {@dont_measure}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x2e}}, {@uid_eq={'uid', 0x3d, 0xee01}}, {@audit}, {@euid_eq={'euid', 0x3d, r2}}, {@obj_user={'obj_user', 0x3d, 'ext2\x00'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:35:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x9765ab7c3ac558c, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=@sg0, &(0x7f0000000140)='./mnt\x00', &(0x7f0000000280)='fuse\x00', 0x808, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:35:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/245, 0xf5}], 0x1, 0x9, 0x7) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000240), 0x80000, 0x0) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000280)=""/244) bind$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e24, 0x9, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 11:35:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000000)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x804, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000140)='mnt/encrypted_dir\x00', &(0x7f0000000280), 0x108400, &(0x7f00000002c0)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@version_L}], [{@obj_role}, {@obj_user={'obj_user', 0x3d, ')/\x06)*!'}}, {@fsname={'fsname', 0x3d, '{.*$,.,.(!/--'}}, {@audit}, {@subj_role={'subj_role', 0x3d, '*\xef'}}, {@dont_appraise}, {@uid_gt={'uid>', 0xee01}}, {@dont_hash}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) mknodat$loop(r2, &(0x7f00000006c0)='./file1\x00', 0x2000, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) openat(r0, &(0x7f0000000680)='./file0\x00', 0x2a2541, 0x100) chroot(&(0x7f00000003c0)='./mnt\x00') syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000440)='mnt/encrypted_dir\x00', 0x8, 0x1, &(0x7f0000000480)=[{&(0x7f0000000500)="3faf9f26b444f4388da88476def9c45fb8ece4b28b45019fb8c3f018cfb6844a6e054905c679beeeaf6b9531d6fbf10fa543a4ceb688587f5db073cd6c7bf6226e80cb2fc863e7b6bb136f95af0233b9ea2d95de3ac1fd428ca7b82601d325fa233d38553b86b328d360290db674cb6ddc8a391eacff4eade7149d4eb21cfe41c50204641a018b9c23b477cfabdd4f6ef83dabdc412dfab89353674ed25b3413b84c7bf2f318f6b7871b6d3fa68cc847ebd7707eaea586cde5d3ab19f7fb4ac085ccf512ff713f67ee929326cc1d66bc564e7598fb65b9b9a1ec01b1378a49edd0", 0xe1, 0xfb}], 0x3000040, &(0x7f0000000600)={[{@shortname_winnt}, {@nonumtail}, {@shortname_lower}, {@shortname_winnt}, {@shortname_winnt}]}) openat(r0, &(0x7f0000000380)='mnt/encrypted_dir\x00', 0x800, 0x32) 11:35:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={0x24, r2, 0x1, 0x0, 0x0, {{}, {@void, @val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x24, 0x0, 0x300, 0x70bd2a, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x48800}, 0x84) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1802.781588] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem 11:35:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000280)='./file0\x00') r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) finit_module(r0, 0x0, 0x2) name_to_handle_at(r0, &(0x7f0000000000)='./mnt\x00', &(0x7f0000000080)=@FILEID_BTRFS_WITHOUT_PARENT={0x28, 0x4e, {0x464, 0x3, 0xff000, 0x7ff, 0x3, 0x3}}, &(0x7f0000000140), 0x0) r1 = socket$unix(0x1, 0x2, 0x0) lstat(&(0x7f0000001a80)='./mnt\x00', &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = fork() wait4(r3, 0x0, 0x2, &(0x7f0000000140)) r4 = getpgrp(0xffffffffffffffff) r5 = getgid() r6 = fcntl$getown(r0, 0x9) r7 = getgid() sendmsg$unix(r1, &(0x7f0000001bc0)={&(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000019c0)=[{&(0x7f0000000340)="0d44d25d5d090f2207345f006f60ec712eb8edbfedc8082c6461a27a86b198b339e2348727fc7070821ee77e36209ece85403553c06c9e2c1429819b609a612862476c00d0f6db9b53b7e3baaa2dc0997883b1f6952b99c878909a037cab6682136282d7a4567c5cb2bb5d389ca05b7390b4796d32c0265b853b277f5c94cabe57517992dbca309dcc1ce4def7997693fb9fd58764fc0b15300b7818b51ce16bc3f725f97e862e03df881b23d19b964515bcf432e05f9b87c16e781f75b2fa501682", 0xc2}, {&(0x7f0000000440)="b768a0f3c9921a6cebdef8a9a6910030ad77a0527f0210ff2cbe13f19942f006da46a64adef681e952a4", 0x2a}, {&(0x7f0000000500)="1c472f0c1198fa3593acde0b90beda6f42c7157c4786bd9ec0802e9b54a8a93b5fc26f0afb08b9db5f37e390a08cf80fe486a21560f7fa52efa14e8ff29a9b684312cde48501362cb5c5005652fa8cde024dcb3e1257cdde1b699b9bf5a021a57648b627dc1ecd301388d7d0c683ac88c8da26de83384a58e99dd09aeac6e50e9baa16ad4902afaa13f89cad18663d6dd0ca8535f2052ea4b5ea1e0ad167b3aeb308f114c83e712b8ccf0ae43f1cd05a9b79d15492d4e35af10bfc949f71cd48e01a4c501c0672497b250bf714368025ad1c55db0667874c9e1e7f1fb4cf2f5696ca327df51de7fcc14e", 0xea}, {&(0x7f0000000600)="ef2f9cb4a2386b997cf667fdc859c379aa63217e1922039ab919b2cc8d68427d79da5812b9aaad9f64ef1caeaf8c737cb06fc63f5035b1d9355002dc18b60a885f5d4e04fa1e03621056d738f3011170ff7108c85d7a5e29f1248f3c23e4d382ba3ef746f00841732169718473b85a9b1b6dbc484fb66b39887867f9", 0x7c}, {&(0x7f0000000480)="5d02e4f403d451c54ae4532d3083e9c342f43b9a47b6a22f0ae79aecd26f4f694d24a8", 0x23}, {&(0x7f0000000680)="a7861dcc20972949183a7b9ea673c190362362062eb0401685803234af20af84ffcdb01bf554e637fdcb7eb8a0825130a56b1c0a647d5e6eb76217b2d34f1f8571c9adcec2d08217c5666aa5ebf993e0dc7c368ba2aeccfbb24add0b21a8e97295631bc23accdbb8e7214c788e0523189e4380ca876e80b2e53a2e3ca2891bfda051077a4134d59d28fe889236ce8af218453461d3673b246186c493325ddb69089e51cdffe31d490394023106ee4e34a896a3b49059e8371fc0246198b4f9ce38c1", 0xc2}, {&(0x7f0000000780)="1b11267688f6b4a45b3f75fd1ada6d56fd1d627e4818758baf845dcbfdf1f72639e7278df0cb073d43b672de4dcd03bfb26414138a4f3a042020e9cb03260539898e20fe4104e88ceb2d63a72c8754f9d65c29a06b35087ca9c08dcf497b2fe54a1adbb17a2053d9256865acdbec7d4c09ddbd07c34e2b40685d780f28a466634d1b2f08a128fdc06ff93533bacb5d79d5c81ec4ddcda813bbc31816cf8265305899ea0584b290bad4b1da875ea28cedc69be69d273e1dd3297ef56c30186425797a7c4784acfb8583a4674dbd577a", 0xcf}, {&(0x7f0000000880)="e1943d3508b8e4ebe0ce1fadbbad7286bb431656f4e9c9280de7febb38cac031c802808332ceba90879f41129a1c8d2242fb986b888217cd1cd2d27b1e279ba87a68f302d00cb714ea229d7ec98a05aca9d6fbf8873cca00b90f", 0x5a}, {&(0x7f0000000900)="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", 0x1000}, {&(0x7f0000001900)="41155f5bf7e2fb3bfbf2de482b3fc6829d431e196fbd3815b194730f63f5fd8e1c4b92bb03f701384fac4b7ff420759b5ee29e1b8e0230ed8ad350435e77ceae695c4a016d91f09e22e2a9fe75fde82eb40f59db98487e1717e8befb76cf77f14edc2b424001d722e7a4fa4f76c8949bb59cede01ae0d4fecb74593d14d047f05a52f7d2961a3482fe1aecc662c15705db54ff0dca90cfdf7d167ea2596b0e5105fdc8c3f51ece34958c", 0xaa}], 0xa, &(0x7f0000001b40)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, r2}}}, @cred={{0x1c, 0x1, 0x2, {r3, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r4, 0x0, r5}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, r7}}}], 0x80, 0x4800}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') getrusage(0x0, &(0x7f0000001c00)) 11:35:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='mnt/encrypted_dir\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="17a6a0eaac0e32a8461c49dceb0533df277e5d4bd3b11c45f345a1ab67ce099c4fccac1ba741ad32443f49d176c24d206586e6dea0d45095903503677517a172bbeec66b1fe41e1713131e653b0ce5ce6844adbde09aa8ef6d5d817b104a0e9becf8387113f4628b006e474d7ddce2170f96b28f4d309ac66e792b655afcb5b1e83b3fb1dbbd6e6523f112a5780df7fd4a835c7f4dd274b3ed14964d1c384a226fd288666b2eaa89e11212b12d3e4d2267376b870a76bee8d7f1d13f01001a66a43e07efc4f8c1712386e7fa0196b5030049a5b777c17a79e208ffe6a3b987012637c4f874f403c1", 0xe8}], 0x800000, &(0x7f0000000340)={[{@minixdf}, {@data_writeback}, {@resgid={'resgid', 0x3d, 0xee00}}, {@prjquota}], [{@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x66, 0x36, 0x30, 0x63, 0x65, 0x30], 0x2d, [0x39, 0x38, 0x61, 0x35], 0x2d, [0x66, 0x64, 0x61, 0x62], 0x2d, [0x61, 0x38, 0x65, 0x62], 0x2d, [0x37, 0x61, 0x38, 0x31, 0x63, 0x33, 0x63, 0x62]}}}]}) lseek(r0, 0xfffffffffffffffd, 0x4) 11:35:00 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1802.833240] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1802.836790] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 1802.837315] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1802.847662] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1802.852680] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1802.866846] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1802.875810] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1802.884722] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1802.898761] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1802.929333] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1802.986977] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 11:35:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x803}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0xfffffffffffffeb3, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./mnt\x00', 0x1) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0xe080, 0x0) mknodat$loop(r0, &(0x7f0000000300)='./file0\x00', 0x6000, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20000, 0x40) r1 = epoll_create(0xfffffff7) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x7, 0x80000001}) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') creat(&(0x7f0000000280)='mnt/encrypted_dir\x00', 0x1a0) 11:35:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') syz_io_uring_setup(0x3ac4, &(0x7f00000002c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f00000001c0)=0x0) mount$bind(&(0x7f0000002800)='mnt/encrypted_dir\x00', &(0x7f0000002840)='mnt/encrypted_dir/file0\x00', &(0x7f0000002880), 0x101000, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = fork() wait4(r2, 0x0, 0x2, &(0x7f0000000140)) syz_open_procfs(r2, &(0x7f0000002ac0)='net/protocols\x00') syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x2, 0x2004, @fd_index=0x12800000, 0x1, &(0x7f0000002b40)=[{&(0x7f00000028c0)=""/222, 0xde}, {&(0x7f00000029c0)=""/100, 0x64}, {&(0x7f0000002a40)=""/6, 0x6}, {&(0x7f0000002bc0)=""/63, 0x3f}, {&(0x7f0000002c00)=""/102393, 0x18ff9}, {&(0x7f0000002b00)=""/57, 0x39}], 0x6, 0x5, 0x1}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x100000e, 0x4010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r1, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) chdir(&(0x7f0000002a80)='./mnt\x00') r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f000001bd40)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) wait4(0x0, 0x0, 0x2, &(0x7f0000000140)) ptrace$getregset(0x4204, 0x0, 0x201, &(0x7f000001bd00)={&(0x7f000001bc00)=""/242, 0xf2}) sendmsg$NL80211_CMD_REQ_SET_REG(r4, 0x0, 0x4014) syz_io_uring_submit(r3, 0x0, &(0x7f00000027c0)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f0000002780)={&(0x7f0000000000)=@vsock, 0x80, &(0x7f00000016c0)=[{&(0x7f0000000200)=""/233, 0xe9}, {&(0x7f0000000080)=""/124, 0x7c}, {&(0x7f0000000300)=""/249, 0xf9}, {&(0x7f0000000400)=""/91, 0x5b}, {&(0x7f0000000500)=""/135, 0x87}, {&(0x7f00000005c0)=""/238, 0xee}, {&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f0000000140)=""/16, 0x10}, {&(0x7f0000000480)=""/14, 0xe}], 0x9, &(0x7f0000001780)=""/4096, 0x1000}, 0x0, 0x20, 0x1, {0x2}}, 0x8) [ 1803.057772] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 11:35:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) unlinkat(r0, &(0x7f0000000000)='./mnt\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x8}}, './file1\x00'}) signalfd4(r0, &(0x7f0000000080)={[0x40e8]}, 0x8, 0x80800) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)=0x0) syz_open_procfs(r2, &(0x7f0000000480)='statm\x00') mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x8}, 0x8000, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 11:35:00 executing program 7: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000340)='./file1\x00', &(0x7f0000000380), 0x800000, &(0x7f00000003c0)={'trans=virtio,', {[{@access_any}, {@aname={'aname', 0x3d, 'ext2\x00'}}, {@loose}, {@access_client}, {@debug={'debug', 0x3d, 0x10000}}, {@version_9p2000}, {@privport}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nl80211\x00'}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0\x00'}}]}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007240)=[{{&(0x7f0000004580)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:35:00 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_OFF(0x3b, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) open_tree(r0, &(0x7f0000000080)='mnt/encrypted_dir\x00', 0x80800) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) futimesat(r1, &(0x7f0000000140)='mnt/encrypted_dir\x00', &(0x7f0000000280)={{0x77359400}, {0x77359400}}) stat(&(0x7f00000002c0)='mnt/encrypted_dir\x00', &(0x7f0000000300)) [ 1803.173759] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 1803.178166] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1803.188874] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 1803.202861] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 1803.208121] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 1803.267379] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1803.325607] EXT4-fs (loop4): Unrecognized mount option "./file0/../file0" or missing value [ 1803.651184] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1803.995181] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.3'. VM DIAGNOSIS: 11:40:01 Registers: info registers vcpu 0 RAX=ffffffff83e6ae20 RBX=0000000000000000 RCX=ffffffff83e52c1c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e6b428 RBP=fffffbfff09c6450 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85674108 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e6ae2e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055e2e1dcc7b8 CR3=000000000e28a000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=007902fe016c6c6f502e726567616e61 XMM02=000000000000000040f9338000000000 XMM03=000006060201836f6f46fc315a9094fc XMM04=0b00737472617473657220726f747563 XMM05=6578650d006567616972742063657865 XMM06=636578650a00657a696d696e696d2063 XMM07=6e696820636578650a006873616d7320 XMM08=6c61746f7420636578650a006e656720 XMM09=617473657220726f7475636578651100 XMM10=65676169727420636578650b00737472 XMM11=00657a696d696e696d20636578650d00 XMM12=6578650a006873616d7320636578650a XMM13=657320636578650a0073746e69682063 XMM14=0e007a7a756620636578650900736465 XMM15=00006574616469646e61632063657865 info registers vcpu 1 RAX=ffffffff83e6ae20 RBX=0000000000000001 RCX=ffffffff83e52c1c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e6b428 RBP=ffffed1001130000 RSP=ffff88800898fe70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85674108 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e6ae2e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f87c3b0f010 CR3=000000000e6fc000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=25252525252525252525252525252525 XMM01=ffff00ff0000ffff0000000000000000 XMM02=ffff0000000000ff0000000000000000 XMM03=732f646d65747379732f6e75722f2065 XMM04=40404040404040404040404040404040 XMM05=5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a XMM06=20202020202020202020202020202020 XMM07=00000000000000000000000000000000 XMM08=000073252f732500242b5d2d5f392d30 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000