port}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x0, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:16:17 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:16:17 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 1924.980709] 9pnet: Insufficient options for proto=fd [ 1924.984537] 9pnet: Insufficient options for proto=fd [ 1925.004446] 9pnet: Insufficient options for proto=fd [ 1925.034730] 9pnet: Insufficient options for proto=fd [ 1925.034963] 9pnet: Insufficient options for proto=fd 02:16:30 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:16:30 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x0, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:16:30 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac7", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:16:30 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:16:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 02:16:30 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:16:30 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:16:30 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) [ 1937.588844] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 02:16:30 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 1937.617759] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1937.631549] 9pnet: Insufficient options for proto=fd [ 1937.646813] 9pnet: Insufficient options for proto=fd [ 1937.660527] 9pnet: Insufficient options for proto=fd [ 1937.665937] 9pnet: Insufficient options for proto=fd 02:16:30 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x0, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 1937.684752] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1937.686921] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1937.688598] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1937.695965] 9pnet: Insufficient options for proto=fd [ 1937.705007] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1937.706778] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1937.712818] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:16:30 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 1937.805891] 9pnet: Insufficient options for proto=fd [ 1937.828734] 9pnet: Insufficient options for proto=fd 02:16:47 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:16:47 executing program 7: openat$bsg(0xffffffffffffff9c, &(0x7f0000001080), 0x4b0802, 0x400000000000000) 02:16:47 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:16:47 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x0, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:16:47 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 02:16:47 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7e", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:16:47 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac7", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:16:47 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 1954.819251] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1954.838380] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 02:16:47 executing program 7: openat$bsg(0xffffffffffffff9c, &(0x7f0000001080), 0x4b0802, 0x8000000000000) [ 1954.875459] 9pnet: Insufficient options for proto=fd [ 1954.880635] 9pnet: Insufficient options for proto=fd [ 1954.887506] 9pnet: Insufficient options for proto=fd [ 1954.889236] 9pnet: Insufficient options for proto=fd [ 1954.904714] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1954.905751] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1954.906839] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1954.935814] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1954.937495] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1954.940099] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:16:47 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:16:47 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x0, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:16:47 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:16:47 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7e", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:16:47 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7e", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:16:47 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 1955.017408] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1955.058832] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1955.088635] 9pnet: Insufficient options for proto=fd [ 1955.096257] 9pnet: Insufficient options for proto=fd [ 1955.102572] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1955.104509] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1955.106658] 9pnet: Insufficient options for proto=fd [ 1955.110882] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1955.115862] 9pnet: Insufficient options for proto=fd [ 1955.166663] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1955.167638] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1955.168687] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:16:59 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:16:59 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 02:16:59 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:16:59 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x0, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:16:59 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:16:59 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7e", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:16:59 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 02:16:59 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 1966.979505] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1966.998341] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1966.998824] 9pnet: Insufficient options for proto=fd [ 1967.026378] 9pnet: Insufficient options for proto=fd [ 1967.029321] 9pnet: Insufficient options for proto=fd [ 1967.031308] 9pnet: Insufficient options for proto=fd 02:16:59 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:16:59 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:16:59 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 1967.078089] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1967.079636] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1967.081670] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1967.084797] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1967.086932] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1967.095286] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:16:59 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x0, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:17:00 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:17:00 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x0, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 1967.142315] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1967.169690] 9pnet: Insufficient options for proto=fd [ 1967.183839] 9pnet: Insufficient options for proto=fd [ 1967.215113] 9pnet: Insufficient options for proto=fd 02:17:00 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 1967.226405] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1967.228310] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1967.230492] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1967.237530] 9pnet: Insufficient options for proto=fd 02:17:00 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:17:00 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 1967.288895] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1967.298510] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1967.323649] 9pnet: Insufficient options for proto=fd [ 1967.324578] 9pnet: Insufficient options for proto=fd [ 1967.369038] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1967.369864] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1967.370772] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1967.397595] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1967.399326] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1967.401125] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:17:13 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 1980.401640] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 02:17:13 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:17:13 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:17:13 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:17:13 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x0, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:17:13 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:17:13 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:17:13 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 1980.434856] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1980.451754] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1980.461388] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1980.483640] 9pnet: Insufficient options for proto=fd [ 1980.490803] 9pnet: Insufficient options for proto=fd [ 1980.492714] 9pnet: Insufficient options for proto=fd [ 1980.496220] 9pnet: Insufficient options for proto=fd [ 1980.509890] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1980.511461] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1980.514310] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1980.525242] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1980.526797] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1980.529203] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1980.546012] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1980.547633] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1980.549759] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:17:13 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:17:13 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7e", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 1980.565893] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1980.567519] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1980.576860] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:17:13 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:17:13 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x0, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 1980.652765] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 02:17:13 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:17:13 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 1980.712656] 9pnet: Insufficient options for proto=fd 02:17:13 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12c", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 1980.749497] 9pnet: Insufficient options for proto=fd [ 1980.765840] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1980.769684] 9pnet: Insufficient options for proto=fd 02:17:13 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 1980.807318] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1980.832087] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1980.832251] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1980.833819] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1980.886118] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1980.891456] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1980.916890] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1980.918457] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1980.924749] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1980.927151] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1980.928762] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1980.930774] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1980.965014] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1980.966801] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1980.968449] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1981.007621] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1981.009204] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1981.010973] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:17:26 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:17:26 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:17:26 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12c", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:17:26 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:17:26 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:17:26 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x0, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:17:26 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac7", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:17:26 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 1994.109267] 9pnet: Insufficient options for proto=fd [ 1994.125697] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1994.158316] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 02:17:27 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 1994.191567] 9pnet: Insufficient options for proto=fd [ 1994.208492] 9pnet: Insufficient options for proto=fd [ 1994.224700] 9pnet: Insufficient options for proto=fd [ 1994.261344] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1994.263040] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1994.263388] 9pnet: Insufficient options for proto=fd [ 1994.264961] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1994.269588] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1994.271592] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1994.274287] 9pnet: Insufficient options for proto=fd [ 1994.278945] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:17:27 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:17:27 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x0, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:17:27 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 1994.372806] 9pnet: Insufficient options for proto=fd 02:17:27 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12c", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:17:27 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:17:27 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)) 02:17:27 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac7", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 1994.454394] 9pnet: Insufficient options for proto=fd [ 1994.480428] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1994.507526] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1994.508721] 9pnet: Insufficient options for proto=fd [ 1994.540626] 9pnet: Insufficient options for proto=fd [ 1994.546764] 9pnet: Insufficient options for proto=fd [ 1994.599297] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1994.601035] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1994.602647] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1994.604291] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1994.606168] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1994.608869] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:17:42 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac7", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:17:42 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:17:42 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:17:42 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac7", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:17:42 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:17:42 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x0, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2009.960431] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 02:17:42 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) 02:17:42 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)) [ 2009.982478] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2009.990350] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2010.003940] 9pnet: Insufficient options for proto=fd [ 2010.006415] 9pnet: Insufficient options for proto=fd [ 2010.014858] 9pnet: Insufficient options for proto=fd [ 2010.038953] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2010.040732] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2010.044137] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2010.045025] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2010.045934] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:17:42 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2010.050650] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:17:42 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x0, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:17:42 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:17:42 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) [ 2010.082827] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2010.084130] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2010.085093] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:17:42 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:17:43 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:17:43 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2010.144410] 9pnet: Insufficient options for proto=fd [ 2010.166227] 9pnet: Insufficient options for proto=fd 02:17:43 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:17:43 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2010.222363] 9pnet: Insufficient options for proto=fd [ 2010.225774] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2010.250366] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2010.271948] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2010.332717] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2010.333611] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2010.334730] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2010.343002] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2010.343903] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2010.344786] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2010.346835] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2010.347703] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2010.348680] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2022.822753] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 02:17:55 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:17:55 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:17:55 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:17:55 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:17:55 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:17:55 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:17:55 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:17:55 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2022.861371] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2022.874330] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2022.891526] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2022.908656] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2022.928886] 9pnet: Insufficient options for proto=fd [ 2022.933751] 9pnet: Insufficient options for proto=fd [ 2022.959764] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2022.961425] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2022.964401] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2022.965976] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2022.972605] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2022.979563] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:17:55 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', 0x0, 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:17:55 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2023.008662] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2023.010496] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2023.011577] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2023.012471] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2023.013691] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2023.018631] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2023.029381] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2023.031173] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2023.049507] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:17:55 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:17:56 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:17:56 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x0, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:17:56 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2023.192451] 9pnet: Insufficient options for proto=fd [ 2023.212925] 9pnet: Insufficient options for proto=fd [ 2023.244385] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2023.270257] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2023.311397] 9pnet: Insufficient options for proto=fd [ 2023.369911] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2023.371533] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2023.373235] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2023.382075] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2023.383708] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2023.385350] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:18:09 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:18:09 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:18:09 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:18:09 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:18:09 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', 0x0, 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:18:09 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:18:09 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc0000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:18:09 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2036.541567] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2036.567806] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2036.580410] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2036.591608] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2036.606227] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2036.622601] 9pnet: Insufficient options for proto=fd [ 2036.623919] 9pnet: Insufficient options for proto=fd 02:18:09 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', 0x0, 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2036.631951] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2036.633947] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2036.637563] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2036.648799] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2036.649930] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2036.651506] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2036.665352] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2036.667045] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2036.671218] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2036.672429] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2036.681600] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2036.681659] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2036.683268] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2036.688863] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:18:09 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2036.710928] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:18:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 02:18:09 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:18:09 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:18:09 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12c", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2036.816512] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 02:18:09 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2036.845794] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2036.855520] 9pnet: Insufficient options for proto=fd 02:18:09 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2036.875660] 9pnet: Insufficient options for proto=fd [ 2036.904289] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2036.906289] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2036.912279] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:18:09 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc0000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:18:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 02:18:09 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3]) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2036.978485] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2037.005951] 9pnet: Insufficient options for proto=fd [ 2037.008810] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2037.011306] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2037.017149] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2037.036607] 9pnet: Insufficient options for proto=fd [ 2037.040454] 9pnet: Insufficient options for proto=fd [ 2037.074563] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2037.076217] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2037.077909] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:18:26 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 02:18:26 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:18:26 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:18:26 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc0000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:18:26 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12c", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:18:26 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12c", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:18:26 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:18:26 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3]) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2053.485433] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2053.501202] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2053.510686] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2053.521578] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2053.536433] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2053.556446] 9pnet: Insufficient options for proto=fd [ 2053.559582] 9pnet: Insufficient options for proto=fd [ 2053.563485] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2053.564490] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2053.565601] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2053.584686] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2053.585697] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 02:18:26 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r2}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2053.589548] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2053.602738] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2053.603786] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2053.604824] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2053.609434] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2053.610429] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2053.616680] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2053.617853] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2053.620317] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2053.623556] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:18:26 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:18:26 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:18:26 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3]) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2053.676743] 9pnet: Insufficient options for proto=fd [ 2053.758829] 9pnet: Insufficient options for proto=fd [ 2053.768828] 9pnet: Insufficient options for proto=fd 02:18:38 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12c", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:18:38 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:18:38 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r2}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:18:38 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:18:38 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB]) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:18:38 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)) 02:18:38 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:18:38 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2065.916563] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:18:38 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') [ 2065.930775] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2065.946705] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2065.983449] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2065.992568] 9pnet: Insufficient options for proto=fd [ 2065.999843] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2066.001454] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2066.001795] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2066.002876] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2066.003469] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2066.006789] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2066.011450] 9pnet: Insufficient options for proto=fd [ 2066.012952] 9pnet: Insufficient options for proto=fd [ 2066.017853] 9pnet: Insufficient options for proto=fd 02:18:38 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r2}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:18:38 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:18:38 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) [ 2066.060176] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2066.060964] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2066.061884] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:18:38 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:18:38 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB]) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2066.104901] 9pnet: Insufficient options for proto=fd 02:18:38 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:18:39 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2066.136371] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 02:18:39 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2066.177180] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 02:18:39 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2066.212617] 9pnet: Insufficient options for proto=fd [ 2066.235792] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2066.236848] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2066.237921] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2066.252794] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2066.253814] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2066.254877] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:18:39 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:18:39 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2066.274938] 9pnet: Insufficient options for proto=fd [ 2066.280787] 9pnet: Insufficient options for proto=fd [ 2066.321819] 9pnet: Insufficient options for proto=fd [ 2066.349859] 9pnet: Insufficient options for proto=fd [ 2066.359467] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2066.451596] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2066.453206] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2066.455032] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:18:51 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:18:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) 02:18:51 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) 02:18:51 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:18:51 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB]) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:18:51 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) 02:18:51 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:18:51 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2078.886127] 9pnet: Insufficient options for proto=fd [ 2078.895852] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2078.912368] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 02:18:51 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:18:51 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2078.957582] 9pnet: Insufficient options for proto=fd [ 2078.964819] 9pnet: Insufficient options for proto=fd [ 2078.967989] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2078.968895] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2078.969868] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:18:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) [ 2079.006874] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:18:51 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2079.033841] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2079.035031] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2079.035941] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2079.045491] 9pnet: Insufficient options for proto=fd [ 2079.093398] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2079.095255] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2079.098208] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2079.141729] 9pnet: Insufficient options for proto=fd 02:19:06 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') 02:19:06 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:19:06 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x0, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:19:06 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:19:06 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:19:06 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:19:06 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:19:06 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2093.213434] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2093.236862] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2093.257714] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2093.307859] 9pnet: Insufficient options for proto=fd [ 2093.313431] 9pnet: Insufficient options for proto=fd [ 2093.321653] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2093.322314] 9pnet: Insufficient options for proto=fd [ 2093.323353] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2093.323587] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2093.341785] 9pnet: Insufficient options for proto=fd [ 2093.347534] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2093.349411] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2093.353416] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:19:06 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:19:06 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) 02:19:06 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:19:06 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:19:06 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) 02:19:06 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x0, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:19:06 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x0, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:19:06 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc0000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2093.552473] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2093.592450] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2093.616007] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2093.645914] 9pnet: Insufficient options for proto=fd [ 2093.648945] 9pnet: Insufficient options for proto=fd [ 2093.657864] 9pnet: Insufficient options for proto=fd 02:19:06 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2093.699666] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2093.700923] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2093.701408] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2093.702983] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2093.704736] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2093.708600] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2093.730840] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2093.732571] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2093.738477] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:19:06 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) 02:19:06 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:19:06 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2093.857606] 9pnet: Insufficient options for proto=fd [ 2093.883859] 9pnet: Insufficient options for proto=fd [ 2093.896518] 9pnet: Insufficient options for proto=fd [ 2093.901511] 9pnet: Insufficient options for proto=fd 02:19:19 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) 02:19:19 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./fi']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:19:19 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:19:19 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x0, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:19:19 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x0, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:19:19 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc0000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:19:19 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) 02:19:19 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2106.554402] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2106.573687] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2106.583976] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2106.595903] 9pnet: Insufficient options for proto=fd [ 2106.597913] 9pnet: Insufficient options for proto=fd [ 2106.602820] 9pnet: Insufficient options for proto=fd [ 2106.605266] 9pnet: Insufficient options for proto=fd 02:19:19 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:19:19 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:19:19 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2106.643603] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2106.644467] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2106.645399] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2106.650048] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2106.650872] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2106.652066] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2106.666927] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2106.668198] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2106.669911] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2106.679548] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:19:19 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2106.717579] 9pnet: Insufficient options for proto=fd [ 2106.729796] 9pnet: Insufficient options for proto=fd [ 2106.732434] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2106.784152] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2106.785053] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2106.785966] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2106.811569] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2106.812439] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2106.813528] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:19:32 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x0, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:19:32 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:19:32 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:19:32 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 02:19:32 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:19:32 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc0000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:19:32 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2119.240515] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 02:19:32 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./fi']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2119.278426] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2119.307579] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2119.320809] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2119.348983] 9pnet: Insufficient options for proto=fd [ 2119.357683] 9pnet: Insufficient options for proto=fd [ 2119.367660] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2119.369381] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2119.373815] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:19:32 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) [ 2119.385303] 9pnet: Insufficient options for proto=fd [ 2119.399905] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2119.401775] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2119.410368] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2119.412143] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2119.415385] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2119.425793] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2119.456588] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2119.458322] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2119.462265] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:19:32 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:19:32 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./fi']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:19:32 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:19:32 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:19:32 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)) socket$inet6_udp(0xa, 0x2, 0x0) 02:19:32 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)) socket$inet6_udp(0xa, 0x2, 0x0) [ 2119.592441] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2119.630450] 9pnet: Insufficient options for proto=fd [ 2119.636718] 9pnet: Insufficient options for proto=fd 02:19:32 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2119.683818] 9pnet: Insufficient options for proto=fd [ 2119.698740] 9pnet: Insufficient options for proto=fd 02:19:32 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:19:32 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc0000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2119.748313] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2119.751302] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2119.754399] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2119.762315] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 02:19:32 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc0000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2119.860311] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2119.863726] 9pnet: Insufficient options for proto=fd [ 2119.893917] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2119.895650] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2119.897449] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2119.921552] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2119.950923] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2119.952739] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2119.956556] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2120.028588] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2120.030439] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2120.032322] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:19:45 executing program 7: openat$bsg(0xffffffffffffff9c, &(0x7f0000001080), 0x4b0803, 0x0) 02:19:45 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)) 02:19:45 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2132.882908] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 02:19:45 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:19:45 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:19:45 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x0, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:19:45 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:19:45 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2132.923981] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2132.942746] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 02:19:45 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2132.972907] 9pnet: Insufficient options for proto=fd [ 2132.995990] 9pnet: Insufficient options for proto=fd [ 2132.999746] 9pnet: Insufficient options for proto=fd 02:19:45 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2133.035470] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2133.037102] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2133.039319] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2133.039369] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2133.040897] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2133.045307] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2133.059794] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2133.062543] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2133.087239] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:19:46 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) 02:19:46 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:19:46 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:19:46 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x0, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2133.178728] 9pnet: Insufficient options for proto=fd 02:19:46 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x0, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2133.213610] 9pnet: Insufficient options for proto=fd [ 2133.227329] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2133.278666] 9pnet: Insufficient options for proto=fd [ 2133.282372] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2133.301517] 9pnet: Insufficient options for proto=fd [ 2133.318699] 9pnet: Insufficient options for proto=fd [ 2133.340115] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2133.341737] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2133.348091] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2133.397496] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2133.399104] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2133.405329] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:20:00 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:20:00 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x0, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:20:00 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:20:00 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:20:00 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:20:00 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2147.912660] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 02:20:00 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:20:00 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2147.945808] 9pnet: Insufficient options for proto=fd [ 2147.948879] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2147.979624] 9pnet: Insufficient options for proto=fd [ 2147.980895] 9pnet: Insufficient options for proto=fd [ 2147.982909] 9pnet: Insufficient options for proto=fd [ 2147.989588] 9pnet: Insufficient options for proto=fd [ 2147.993218] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2147.994170] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2147.996407] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2148.005548] 9pnet: Insufficient options for proto=fd [ 2148.020240] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2148.021164] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2148.022166] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:20:00 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:20:00 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:20:00 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:20:00 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:20:00 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x0, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:20:00 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:20:00 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:20:00 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x0, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2148.124372] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2148.145232] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2148.145469] 9pnet: Insufficient options for proto=fd [ 2148.171732] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2148.182473] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2148.212409] 9pnet: Insufficient options for proto=fd [ 2148.214194] 9pnet: Insufficient options for proto=fd [ 2148.222316] 9pnet: Insufficient options for proto=fd [ 2148.225838] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2148.227605] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2148.230741] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2148.244447] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2148.245317] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2148.246244] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2148.268704] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2148.269654] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2148.270687] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2148.275311] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2148.276965] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2148.283184] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:20:17 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x0, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:20:17 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:20:17 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x0, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:20:17 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:20:17 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:20:17 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2164.265000] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:20:17 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:20:17 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x0, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2164.286682] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2164.302224] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2164.312533] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2164.327643] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2164.344797] 9pnet: Insufficient options for proto=fd [ 2164.347994] 9pnet: Insufficient options for proto=fd [ 2164.356788] 9pnet: Insufficient options for proto=fd [ 2164.362061] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2164.363748] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2164.365689] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2164.372124] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2164.373634] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2164.375603] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:20:17 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2164.396970] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2164.398755] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2164.402119] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2164.414773] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2164.416500] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2164.421880] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2164.438680] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2164.440511] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2164.444714] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:20:17 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:20:17 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:20:17 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x0, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2164.478329] 9pnet: Insufficient options for proto=fd [ 2164.517786] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 02:20:17 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x0, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2164.584587] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2164.610352] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2164.611390] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2164.613916] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2164.616531] 9pnet: Insufficient options for proto=fd [ 2164.622390] 9pnet: Insufficient options for proto=fd [ 2164.673877] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2164.675823] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2164.678194] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:20:30 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:20:30 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:20:30 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:20:30 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x0, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:20:30 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:20:30 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x0, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:20:30 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:20:30 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x0, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2178.101742] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2178.122800] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2178.137744] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2178.148305] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2178.161872] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2178.183796] 9pnet: Insufficient options for proto=fd [ 2178.199269] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2178.199697] 9pnet: Insufficient options for proto=fd [ 2178.200327] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2178.200498] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2178.210467] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2178.211995] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2178.214272] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2178.215665] 9pnet: Insufficient options for proto=fd 02:20:31 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2178.230862] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2178.231935] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2178.237879] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2178.239632] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2178.241360] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2178.243599] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2178.266929] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2178.268080] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2178.269274] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2178.296681] 9pnet: Insufficient options for proto=fd 02:20:31 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:20:31 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:20:31 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:20:31 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x0, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:20:31 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2178.391322] 9pnet: Insufficient options for proto=fd 02:20:31 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') [ 2178.401853] 9pnet: Insufficient options for proto=fd 02:20:31 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2178.437266] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2178.464951] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2178.483799] 9pnet: Insufficient options for proto=fd [ 2178.488330] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2178.534888] 9pnet: Insufficient options for proto=fd [ 2178.535466] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2178.537241] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2178.539875] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2178.582746] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2178.583687] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2178.584622] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:20:43 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:20:43 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:20:43 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x0, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:20:43 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:20:43 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:20:43 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:20:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) timerfd_gettime(r0, 0x0) (fail_nth: 1) 02:20:43 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x0, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2190.197789] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2190.206086] FAULT_INJECTION: forcing a failure. [ 2190.206086] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2190.207694] CPU: 1 PID: 12012 Comm: syz-executor.4 Not tainted 5.10.236 #1 [ 2190.208646] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2190.209795] Call Trace: [ 2190.210158] dump_stack+0x107/0x167 [ 2190.210652] should_fail.cold+0x5/0xa [ 2190.211174] _copy_to_user+0x2e/0x180 [ 2190.211703] simple_read_from_buffer+0xcc/0x160 [ 2190.212338] proc_fail_nth_read+0x198/0x230 [ 2190.212941] ? proc_sessionid_read+0x230/0x230 [ 2190.213570] ? security_file_permission+0xb1/0xe0 [ 2190.214233] ? proc_sessionid_read+0x230/0x230 [ 2190.214856] vfs_read+0x228/0x620 [ 2190.215327] ksys_read+0x12d/0x260 [ 2190.215809] ? vfs_write+0xb10/0xb10 [ 2190.216325] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2190.217044] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2190.217753] do_syscall_64+0x33/0x40 [ 2190.218274] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2190.218966] RIP: 0033:0x7f1baadae69c [ 2190.219478] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2190.222007] RSP: 002b:00007f1ba8371170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2190.223046] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f1baadae69c [ 2190.224031] RDX: 000000000000000f RSI: 00007f1ba83711e0 RDI: 0000000000000004 [ 2190.225011] RBP: 00007f1ba83711d0 R08: 0000000000000000 R09: 0000000000000000 [ 2190.225997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2190.226980] R13: 00007ffc9922fa3f R14: 00007f1ba8371300 R15: 0000000000022000 [ 2190.239573] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2190.258395] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 02:20:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) timerfd_gettime(r0, 0x0) [ 2190.273253] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2190.291434] 9pnet: Insufficient options for proto=fd 02:20:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc0300, 0x0) timerfd_gettime(r0, 0x0) [ 2190.295879] 9pnet: Insufficient options for proto=fd [ 2190.300394] 9pnet: Insufficient options for proto=fd [ 2190.316746] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2190.317798] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2190.318847] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2190.319907] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2190.321196] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2190.326510] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2190.336854] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2190.338015] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2190.339177] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2190.348525] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2190.349572] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2190.350662] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:20:43 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:20:43 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:20:43 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:20:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x40000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x20204, 0x0) lseek(r1, 0x8, 0x1) timerfd_gettime(r0, 0x0) 02:20:43 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x0, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:20:43 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x0, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2190.458645] 9pnet: Insufficient options for proto=fd [ 2190.465630] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 02:20:43 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x0, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2190.501548] 9pnet: Insufficient options for proto=fd [ 2190.523539] 9pnet: Insufficient options for proto=fd [ 2190.543347] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2190.544534] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2190.545492] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2190.548248] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2190.566355] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. 02:20:43 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:20:43 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:20:43 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:20:43 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x4000004, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_audit(0x10, 0x3, 0x9) fsetxattr$security_selinux(r0, &(0x7f0000000040), &(0x7f00000000c0)='system_u:object_r:sshd_key_t:s0\x00', 0x20, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="240000006404000826bd7000fb00df25667a8586ff4bcd629a8985c2053e6c75f1e18700"], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="1c0000001e0011cd00000000000000000000000065c9b837495baa5b107ba925922fcabb78dc64b776ebdd683aa1aedf21e0b320c580998c7d1b1ead362651302063123173a9ff4750f9bd9ed85b5c0cf060d872cdfcb1a9256e2886ef8bca6d93b83396e2faca8675152c7b5bd60e795878814b495e50c4ae67b2288dfa2f765e929d518aa111696c6a19147ed77273920622f75581c3e0051543877e0016e846437eda8acd692acb750c95a7475d21ed269be15425f626435c2508630127ecb651cbeac3ad4e90ebbd69d83bc4eed9a0fa6f3e422a954b4746e1ac9926b696b6643aae35dee58843f6ac6c40559b0ac1321f7fd6"], 0x1c}}, 0x0) quotactl(0x9, &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000900)="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") ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000001e00)={{}, 0x0, 0x2, @inherit={0x68, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000004000000000000000010000000000000050000000000000021000000000000000600000000000000040000000000000008000000000000000500000000000000d1e3000000000000ff0600000000000009000000000000000104000000000000"]}, @devid}) r3 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000008c0)=ANY=[@ANYBLOB="1c0000001e0000000579a17ded1100000a000000"], 0x1c}}, 0x0) unshare(0x48020200) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) openat(r4, &(0x7f0000000040)='\x00', 0x214980, 0x1) timerfd_gettime(r4, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x101000, 0x0) [ 2190.625762] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2190.675676] 9pnet: Insufficient options for proto=fd [ 2190.679951] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2190.680804] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2190.681854] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2190.686719] audit: type=1400 audit(1745720443.569:24): avc: denied { relabelto } for pid=12053 comm="syz-executor.4" name="NETLINK" dev="sockfs" ino=45457 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:sshd_key_t:s0 tclass=netlink_audit_socket permissive=1 [ 2190.692529] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2190.693468] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2190.697508] 9pnet: Insufficient options for proto=fd [ 2190.700280] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2190.719882] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2190.720751] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2190.721656] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:20:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) timerfd_gettime(r0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000040)='.log\x00', 0x8000, 0x58) timerfd_gettime(r1, &(0x7f0000000080)) 02:20:55 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:20:55 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 1) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c5", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 02:20:55 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x0, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:20:55 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:20:55 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:20:55 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:20:55 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2202.676530] FAULT_INJECTION: forcing a failure. [ 2202.676530] name failslab, interval 1, probability 0, space 0, times 0 [ 2202.678381] CPU: 0 PID: 12073 Comm: syz-executor.6 Not tainted 5.10.236 #1 [ 2202.679392] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2202.680599] Call Trace: [ 2202.680986] dump_stack+0x107/0x167 [ 2202.681520] should_fail.cold+0x5/0xa [ 2202.682086] ? getname_flags.part.0+0x50/0x4f0 [ 2202.682750] should_failslab+0x5/0x20 [ 2202.683307] kmem_cache_alloc+0x5b/0x310 [ 2202.683901] getname_flags.part.0+0x50/0x4f0 [ 2202.684543] getname_flags+0x9a/0xe0 [ 2202.685086] __x64_sys_rename+0x56/0xa0 [ 2202.685663] do_syscall_64+0x33/0x40 [ 2202.686213] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2202.686959] RIP: 0033:0x7f864dba0b19 [ 2202.687503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2202.690213] RSP: 002b:00007f864b116188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2202.691334] RAX: ffffffffffffffda RBX: 00007f864dcb3f60 RCX: 00007f864dba0b19 [ 2202.692370] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2202.693408] RBP: 00007f864b1161d0 R08: 0000000000000000 R09: 0000000000000000 [ 2202.694458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2202.695496] R13: 00007ffeabe65e1f R14: 00007f864b116300 R15: 0000000000022000 [ 2202.700532] 9pnet: Insufficient options for proto=fd [ 2202.705622] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2202.737943] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2202.762383] 9pnet: Insufficient options for proto=fd [ 2202.763640] 9pnet: Insufficient options for proto=fd [ 2202.771707] 9pnet: Insufficient options for proto=fd [ 2202.805041] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2202.806706] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2202.810333] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2202.822869] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2202.824150] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2202.825082] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2216.444215] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 02:21:09 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:21:09 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x0, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:21:09 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:21:09 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:21:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$DEVLINK_CMD_RATE_GET(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)={0x178, 0x0, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@DEVLINK_ATTR_RATE_NODE_NAME={0xda, 0xa8, @random="5c44f6b9a4ceaf8e4054c280a01c62dbbebb99c270050b0d152494579e4cc49e70c9011043c7ba14237ff7e4f94061d85dc366b13d2ec3e7f211fa44e00648abe61c1ad29d0f365cc8e37e8bca96fa60175cb3f7a751c26d38cfed8bab9f7855395729be282941763be46da5816d4825f9f2cd380f238c5512bba975fdceadb7e786bcac0e936c146fc7b38fc0c5c22f674b9bce34a3232055673c9f9610ab8005a21c9bc77304c18d718b081627ecd66eeb50973d3057d8a8a8716a76516d1cfc1bd5275f89a406cbf48f1f28d0e3ea10b9c2dac3af"}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @handle=@pci={{0x8}, {0x11}}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @handle=@pci={{0x8}, {0x11}}]}, 0x178}, 0x1, 0x0, 0x0, 0x40}, 0x8000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) timerfd_gettime(r2, 0x0) 02:21:09 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 2) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c5", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 02:21:09 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x4000004, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_audit(0x10, 0x3, 0x9) fsetxattr$security_selinux(r0, &(0x7f0000000040), &(0x7f00000000c0)='system_u:object_r:sshd_key_t:s0\x00', 0x20, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="240000006404000826bd7000fb00df25667a8586ff4bcd629a8985c2053e6c75f1e18700"], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="1c0000001e0011cd00000000000000000000000065c9b837495baa5b107ba925922fcabb78dc64b776ebdd683aa1aedf21e0b320c580998c7d1b1ead362651302063123173a9ff4750f9bd9ed85b5c0cf060d872cdfcb1a9256e2886ef8bca6d93b83396e2faca8675152c7b5bd60e795878814b495e50c4ae67b2288dfa2f765e929d518aa111696c6a19147ed77273920622f75581c3e0051543877e0016e846437eda8acd692acb750c95a7475d21ed269be15425f626435c2508630127ecb651cbeac3ad4e90ebbd69d83bc4eed9a0fa6f3e422a954b4746e1ac9926b696b6643aae35dee58843f6ac6c40559b0ac1321f7fd6"], 0x1c}}, 0x0) quotactl(0x9, &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000900)="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") ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000001e00)={{}, 0x0, 0x2, @inherit={0x68, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000004000000000000000010000000000000050000000000000021000000000000000600000000000000040000000000000008000000000000000500000000000000d1e3000000000000ff0600000000000009000000000000000104000000000000"]}, @devid}) r3 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000008c0)=ANY=[@ANYBLOB="1c0000001e0000000579a17ded1100000a000000"], 0x1c}}, 0x0) unshare(0x48020200) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) openat(r4, &(0x7f0000000040)='\x00', 0x214980, 0x1) timerfd_gettime(r4, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x101000, 0x0) 02:21:09 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2216.491406] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2216.508731] FAULT_INJECTION: forcing a failure. [ 2216.508731] name failslab, interval 1, probability 0, space 0, times 0 [ 2216.511355] CPU: 0 PID: 12101 Comm: syz-executor.6 Not tainted 5.10.236 #1 [ 2216.512805] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2216.514552] Call Trace: [ 2216.515118] dump_stack+0x107/0x167 [ 2216.515884] should_fail.cold+0x5/0xa [ 2216.516681] ? create_object.isra.0+0x3a/0xa20 [ 2216.517639] should_failslab+0x5/0x20 [ 2216.518487] kmem_cache_alloc+0x5b/0x310 [ 2216.519359] create_object.isra.0+0x3a/0xa20 [ 2216.520292] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2216.521376] kmem_cache_alloc+0x159/0x310 [ 2216.522284] getname_flags.part.0+0x50/0x4f0 [ 2216.523218] getname_flags+0x9a/0xe0 [ 2216.524008] __x64_sys_rename+0x56/0xa0 [ 2216.524840] do_syscall_64+0x33/0x40 [ 2216.525632] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2216.526723] RIP: 0033:0x7f864dba0b19 [ 2216.527513] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2216.531404] RSP: 002b:00007f864b116188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2216.533015] RAX: ffffffffffffffda RBX: 00007f864dcb3f60 RCX: 00007f864dba0b19 [ 2216.534512] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2216.536033] RBP: 00007f864b1161d0 R08: 0000000000000000 R09: 0000000000000000 [ 2216.537529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2216.539068] R13: 00007ffeabe65e1f R14: 00007f864b116300 R15: 0000000000022000 [ 2216.564804] 9pnet: Insufficient options for proto=fd [ 2216.570422] 9pnet: Insufficient options for proto=fd [ 2216.574016] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2216.574620] 9pnet: Insufficient options for proto=fd [ 2216.576077] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2216.576273] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2216.607848] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2216.609693] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2216.611376] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:21:09 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:21:09 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x0, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:21:09 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:21:09 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:21:09 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x0, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:21:09 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 3) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c5", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) [ 2216.742366] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2216.800616] 9pnet: Insufficient options for proto=fd [ 2216.806358] 9pnet: Insufficient options for proto=fd [ 2216.806583] 9pnet: Insufficient options for proto=fd [ 2216.813851] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 02:21:09 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x0, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2216.833305] FAULT_INJECTION: forcing a failure. [ 2216.833305] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2216.835964] CPU: 0 PID: 12121 Comm: syz-executor.6 Not tainted 5.10.236 #1 [ 2216.837406] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2216.839192] Call Trace: [ 2216.839760] dump_stack+0x107/0x167 [ 2216.840517] should_fail.cold+0x5/0xa [ 2216.841328] strncpy_from_user+0x34/0x470 [ 2216.842232] getname_flags.part.0+0x95/0x4f0 [ 2216.843179] getname_flags+0x9a/0xe0 [ 2216.843976] __x64_sys_rename+0x56/0xa0 [ 2216.844813] do_syscall_64+0x33/0x40 [ 2216.845610] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2216.846718] RIP: 0033:0x7f864dba0b19 [ 2216.847517] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2216.851499] RSP: 002b:00007f864b116188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2216.853147] RAX: ffffffffffffffda RBX: 00007f864dcb3f60 RCX: 00007f864dba0b19 [ 2216.854680] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2216.856215] RBP: 00007f864b1161d0 R08: 0000000000000000 R09: 0000000000000000 [ 2216.857744] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2216.859273] R13: 00007ffeabe65e1f R14: 00007f864b116300 R15: 0000000000022000 02:21:09 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2216.902261] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2216.925963] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2216.928874] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2216.932773] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2216.951596] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2216.953521] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2216.955879] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2216.963250] 9pnet: Insufficient options for proto=fd [ 2216.986403] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2216.987948] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 02:21:09 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x0, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2216.989614] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:21:09 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2217.076347] 9pnet: Insufficient options for proto=fd 02:21:09 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 4) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c5", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 02:21:09 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x0, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:21:09 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2217.129810] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2217.132969] FAULT_INJECTION: forcing a failure. [ 2217.132969] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2217.133003] CPU: 0 PID: 12137 Comm: syz-executor.6 Not tainted 5.10.236 #1 [ 2217.136875] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2217.138674] Call Trace: [ 2217.139248] dump_stack+0x107/0x167 [ 2217.140032] should_fail.cold+0x5/0xa [ 2217.140862] strncpy_from_user+0x34/0x470 [ 2217.141760] getname_flags.part.0+0x95/0x4f0 [ 2217.142722] getname_flags+0x9a/0xe0 [ 2217.143525] __x64_sys_rename+0x56/0xa0 [ 2217.144375] do_syscall_64+0x33/0x40 [ 2217.145176] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2217.146290] RIP: 0033:0x7f864dba0b19 [ 2217.147078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2217.151045] RSP: 002b:00007f864b116188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2217.152686] RAX: ffffffffffffffda RBX: 00007f864dcb3f60 RCX: 00007f864dba0b19 [ 2217.154229] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2217.155768] RBP: 00007f864b1161d0 R08: 0000000000000000 R09: 0000000000000000 [ 2217.157306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2217.158851] R13: 00007ffeabe65e1f R14: 00007f864b116300 R15: 0000000000022000 [ 2217.167762] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2217.215689] 9pnet: Insufficient options for proto=fd [ 2217.240522] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2217.242649] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2217.249599] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2217.268562] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2217.270366] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2217.272268] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:21:22 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:21:22 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x0, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2229.699380] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 02:21:22 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:21:22 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x0, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:21:22 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:21:22 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 5) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c5", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 02:21:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1/file0\x00', 0xa0200, 0x20) r1 = openat(r0, &(0x7f0000000000)='./file1\x00', 0x290cc3, 0xc1) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x200000a, 0x10, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0xfe37}}, './file1\x00'}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000002) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056440)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x30, "4b737ba4ee1944"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000057440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000057640)={0x6b7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5, r6}], 0x8a, "f85b3ae35a0afd"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000577c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000579c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000057bc0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "60ef67ddc19705"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {0x0, r13}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {r11}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000058bc0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058dc0)={0x8dad, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x40, "bcd0eb46ad5df7"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000059dc0)={0x7fffffff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {r7}, {r8, r9}, {r10}, {0x0, r15}, {r16}], 0x2, "ecc63f5ac360ea"}) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r1, 0x7, &(0x7f00000000c0)=r3, 0x1) syz_io_uring_submit(r2, 0x0, &(0x7f0000000040)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x3, 0x6, 0x0, 0xffff, 0x0, 0x2}, 0x2) timerfd_gettime(r1, 0x0) 02:21:22 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2229.744687] FAULT_INJECTION: forcing a failure. [ 2229.744687] name failslab, interval 1, probability 0, space 0, times 0 [ 2229.747263] CPU: 1 PID: 12161 Comm: syz-executor.6 Not tainted 5.10.236 #1 [ 2229.748703] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2229.750429] Call Trace: [ 2229.750976] dump_stack+0x107/0x167 [ 2229.751737] should_fail.cold+0x5/0xa [ 2229.752536] ? create_object.isra.0+0x3a/0xa20 [ 2229.753488] should_failslab+0x5/0x20 [ 2229.754298] kmem_cache_alloc+0x5b/0x310 [ 2229.755148] create_object.isra.0+0x3a/0xa20 [ 2229.756063] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2229.757127] kmem_cache_alloc+0x159/0x310 [ 2229.757993] ? strncpy_from_user+0x9e/0x470 [ 2229.758904] getname_flags.part.0+0x50/0x4f0 [ 2229.759823] getname_flags+0x9a/0xe0 [ 2229.760597] __x64_sys_rename+0x65/0xa0 [ 2229.761416] do_syscall_64+0x33/0x40 [ 2229.762208] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2229.763276] RIP: 0033:0x7f864dba0b19 [ 2229.764046] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2229.767940] RSP: 002b:00007f864b116188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2229.769533] RAX: ffffffffffffffda RBX: 00007f864dcb3f60 RCX: 00007f864dba0b19 [ 2229.771031] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2229.772527] RBP: 00007f864b1161d0 R08: 0000000000000000 R09: 0000000000000000 [ 2229.774058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2229.775594] R13: 00007ffeabe65e1f R14: 00007f864b116300 R15: 0000000000022000 [ 2229.785979] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2229.807538] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2229.825319] 9pnet: Insufficient options for proto=fd [ 2229.835493] 9pnet: Insufficient options for proto=fd 02:21:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) timerfd_gettime(r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) timerfd_gettime(r1, &(0x7f0000000040)) [ 2229.851625] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2229.853166] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2229.854826] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2229.866937] 9pnet: Insufficient options for proto=fd [ 2229.893710] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2229.895244] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2229.897608] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2229.908831] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 02:21:22 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 6) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c5", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) [ 2229.910373] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2229.916265] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:21:22 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x0, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:21:22 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:21:22 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x0, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:21:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) timerfd_gettime(r0, 0x0) 02:21:22 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:21:22 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 1) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:21:22 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2230.044618] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2230.057566] FAULT_INJECTION: forcing a failure. [ 2230.057566] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2230.060277] CPU: 0 PID: 12184 Comm: syz-executor.6 Not tainted 5.10.236 #1 [ 2230.061722] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2230.063463] Call Trace: [ 2230.064013] dump_stack+0x107/0x167 [ 2230.064788] should_fail.cold+0x5/0xa [ 2230.065682] strncpy_from_user+0x34/0x470 [ 2230.066706] getname_flags.part.0+0x95/0x4f0 [ 2230.067625] getname_flags+0x9a/0xe0 [ 2230.068406] __x64_sys_rename+0x65/0xa0 [ 2230.069251] do_syscall_64+0x33/0x40 [ 2230.070030] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2230.071112] RIP: 0033:0x7f864dba0b19 [ 2230.071891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2230.075736] RSP: 002b:00007f864b116188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2230.077327] RAX: ffffffffffffffda RBX: 00007f864dcb3f60 RCX: 00007f864dba0b19 [ 2230.078819] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2230.080299] RBP: 00007f864b1161d0 R08: 0000000000000000 R09: 0000000000000000 [ 2230.081777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2230.083279] R13: 00007ffeabe65e1f R14: 00007f864b116300 R15: 0000000000022000 [ 2230.102660] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2230.118743] FAULT_INJECTION: forcing a failure. [ 2230.118743] name failslab, interval 1, probability 0, space 0, times 0 [ 2230.121305] CPU: 1 PID: 12190 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 2230.122765] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2230.124494] Call Trace: [ 2230.125049] dump_stack+0x107/0x167 [ 2230.125804] should_fail.cold+0x5/0xa [ 2230.126599] ? getname_flags.part.0+0x50/0x4f0 [ 2230.127541] should_failslab+0x5/0x20 [ 2230.128337] kmem_cache_alloc+0x5b/0x310 [ 2230.129166] getname_flags.part.0+0x50/0x4f0 [ 2230.130083] getname_flags+0x9a/0xe0 [ 2230.130849] __x64_sys_rename+0x56/0xa0 [ 2230.131661] do_syscall_64+0x33/0x40 [ 2230.132441] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2230.133493] RIP: 0033:0x7ff904be4b19 [ 2230.134276] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2230.138129] RSP: 002b:00007ff90215a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2230.139734] RAX: ffffffffffffffda RBX: 00007ff904cf7f60 RCX: 00007ff904be4b19 [ 2230.141215] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2230.142703] RBP: 00007ff90215a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2230.144185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2230.145659] R13: 00007ffff65566bf R14: 00007ff90215a300 R15: 0000000000022000 [ 2230.154782] 9pnet: Insufficient options for proto=fd [ 2230.159299] 9pnet: Insufficient options for proto=fd [ 2230.164214] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 02:21:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4802c2, 0x0) timerfd_gettime(r0, 0x0) [ 2230.188346] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2230.189870] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2230.191831] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2230.233708] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2230.235387] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2230.237332] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:21:23 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c8", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:21:23 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x0, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2230.265664] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2230.267203] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2230.269151] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2230.289780] 9pnet: Insufficient options for proto=fd [ 2230.365658] 9pnet: Insufficient options for proto=fd [ 2230.395267] 9pnet: Insufficient options for proto=fd 02:21:36 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 7) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c5", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 02:21:36 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c8", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:21:36 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x0, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:21:36 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') (fail_nth: 1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) 02:21:36 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x0, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:21:36 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.pending_reads\x00', 0x200, 0xa2) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f00000001c0)={{0x8, 0x8}, {0x0, 0x9}, 0x2, 0x5, 0x2}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) timerfd_gettime(r1, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r4 = openat(r2, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) r5 = syz_io_uring_setup(0x68d4, &(0x7f0000000100), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r5, 0x0, &(0x7f0000000000)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_BUFFERS(r5, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f0000000280)=ANY=[@ANYBLOB="011a0000a3c84e94c56c0148", @ANYRESOCT=r5, @ANYBLOB="0000002f6669060000090000000000f6ebd0189a27a449180086dea590232e54f235a818529a20cb0e52798de145fb6142ab316333185c4059a34306428189de8a818b933452892e3e9f46f8d9cd2facee3d78f05fe6ced3ccde64ccdde871e818b3b55f9d6845288ca7d30afd83e6ef54857907b14eaab2bca01c3fd838b803248e7a2437b8095e0869dc480500"/153]) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) timerfd_gettime(r6, &(0x7f0000000380)) timerfd_gettime(r4, &(0x7f0000000080)) [ 2243.326659] FAULT_INJECTION: forcing a failure. [ 2243.326659] name failslab, interval 1, probability 0, space 0, times 0 [ 2243.328265] CPU: 0 PID: 12219 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 2243.329126] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2243.330139] Call Trace: [ 2243.330475] dump_stack+0x107/0x167 [ 2243.330921] should_fail.cold+0x5/0xa [ 2243.331390] ? getname_flags.part.0+0x50/0x4f0 [ 2243.331952] should_failslab+0x5/0x20 [ 2243.332425] kmem_cache_alloc+0x5b/0x310 [ 2243.332928] getname_flags.part.0+0x50/0x4f0 [ 2243.333473] getname_flags+0x9a/0xe0 [ 2243.333933] __x64_sys_rename+0x56/0xa0 [ 2243.334433] do_syscall_64+0x33/0x40 [ 2243.334893] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2243.335524] RIP: 0033:0x7f27391eeb19 [ 2243.335981] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2243.338247] RSP: 002b:00007f2736764188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2243.339190] RAX: ffffffffffffffda RBX: 00007f2739301f60 RCX: 00007f27391eeb19 [ 2243.340067] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000020000380 [ 2243.340943] RBP: 00007f27367641d0 R08: 0000000000000000 R09: 0000000000000000 [ 2243.341818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2243.342948] R13: 00007ffdf1fda73f R14: 00007f2736764300 R15: 0000000000022000 02:21:36 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:21:36 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 2) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2243.350860] FAULT_INJECTION: forcing a failure. [ 2243.350860] name failslab, interval 1, probability 0, space 0, times 0 [ 2243.353231] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2243.353883] CPU: 1 PID: 12225 Comm: syz-executor.6 Not tainted 5.10.236 #1 [ 2243.356293] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2243.358216] Call Trace: [ 2243.358837] dump_stack+0x107/0x167 [ 2243.359685] should_fail.cold+0x5/0xa [ 2243.360566] ? jbd2__journal_start+0x190/0x7e0 [ 2243.361628] should_failslab+0x5/0x20 [ 2243.362514] kmem_cache_alloc+0x5b/0x310 [ 2243.363447] ? ext4_dx_find_entry+0x600/0x600 [ 2243.364485] jbd2__journal_start+0x190/0x7e0 [ 2243.365504] __ext4_journal_start_sb+0x214/0x390 [ 2243.366608] ext4_rename+0x96d/0x2bc0 [ 2243.367495] ? ext4_tmpfile+0x440/0x440 [ 2243.368410] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2243.369635] ? lock_acquire+0x197/0x470 [ 2243.370553] ? vfs_rename+0xc68/0x1510 [ 2243.371462] ? lockref_get+0x11/0x50 [ 2243.372316] ? find_held_lock+0x2c/0x110 [ 2243.373272] ? down_write+0xe0/0x160 [ 2243.374134] ext4_rename2+0x1af/0x240 [ 2243.375014] vfs_rename+0xd6c/0x1510 [ 2243.375879] ? vfs_unlink+0x8b0/0x8b0 [ 2243.376766] ? lookup_dcache+0x65/0x130 [ 2243.377727] do_renameat2+0xae1/0xbf0 [ 2243.378622] ? __ia32_sys_link+0x80/0x80 [ 2243.379564] ? __virt_addr_valid+0x170/0x5d0 [ 2243.380583] ? __check_object_size+0x319/0x440 [ 2243.381670] __x64_sys_rename+0x7d/0xa0 [ 2243.382596] do_syscall_64+0x33/0x40 [ 2243.383453] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2243.384631] RIP: 0033:0x7f864dba0b19 [ 2243.385492] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2243.389754] RSP: 002b:00007f864b116188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2243.391520] RAX: ffffffffffffffda RBX: 00007f864dcb3f60 RCX: 00007f864dba0b19 [ 2243.393173] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2243.394825] RBP: 00007f864b1161d0 R08: 0000000000000000 R09: 0000000000000000 [ 2243.396478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2243.398119] R13: 00007ffeabe65e1f R14: 00007f864b116300 R15: 0000000000022000 [ 2243.413869] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2243.419908] FAULT_INJECTION: forcing a failure. [ 2243.419908] name failslab, interval 1, probability 0, space 0, times 0 [ 2243.421526] CPU: 0 PID: 12227 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 2243.422407] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2243.423448] Call Trace: [ 2243.423790] dump_stack+0x107/0x167 [ 2243.424281] should_fail.cold+0x5/0xa [ 2243.424789] ? create_object.isra.0+0x3a/0xa20 [ 2243.425397] should_failslab+0x5/0x20 [ 2243.425882] kmem_cache_alloc+0x5b/0x310 [ 2243.426403] create_object.isra.0+0x3a/0xa20 [ 2243.426961] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2243.427604] kmem_cache_alloc+0x159/0x310 [ 2243.428131] getname_flags.part.0+0x50/0x4f0 [ 2243.428682] getname_flags+0x9a/0xe0 [ 2243.429151] __x64_sys_rename+0x56/0xa0 [ 2243.429649] do_syscall_64+0x33/0x40 [ 2243.430117] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2243.430785] RIP: 0033:0x7ff904be4b19 02:21:36 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') (fail_nth: 2) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) [ 2243.431260] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2243.433809] RSP: 002b:00007ff90215a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2243.434791] RAX: ffffffffffffffda RBX: 00007ff904cf7f60 RCX: 00007ff904be4b19 [ 2243.435689] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2243.436587] RBP: 00007ff90215a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2243.437489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2243.438391] R13: 00007ffff65566bf R14: 00007ff90215a300 R15: 0000000000022000 [ 2243.462927] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2243.464182] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2243.465353] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2243.466065] 9pnet: Insufficient options for proto=fd [ 2243.479914] 9pnet: Insufficient options for proto=fd [ 2243.481811] 9pnet: Insufficient options for proto=fd [ 2243.484864] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2243.485911] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2243.487988] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2243.498945] FAULT_INJECTION: forcing a failure. [ 2243.498945] name failslab, interval 1, probability 0, space 0, times 0 [ 2243.502232] CPU: 1 PID: 12238 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 2243.503840] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2243.505759] Call Trace: [ 2243.506383] dump_stack+0x107/0x167 [ 2243.507221] should_fail.cold+0x5/0xa [ 2243.508098] ? create_object.isra.0+0x3a/0xa20 [ 2243.509160] should_failslab+0x5/0x20 [ 2243.510033] kmem_cache_alloc+0x5b/0x310 [ 2243.510978] create_object.isra.0+0x3a/0xa20 [ 2243.511983] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2243.513151] kmem_cache_alloc+0x159/0x310 [ 2243.514116] getname_flags.part.0+0x50/0x4f0 [ 2243.515137] getname_flags+0x9a/0xe0 [ 2243.515992] __x64_sys_rename+0x56/0xa0 [ 2243.516912] do_syscall_64+0x33/0x40 [ 2243.517775] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2243.518966] RIP: 0033:0x7f27391eeb19 [ 2243.519820] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2243.524051] RSP: 002b:00007f2736764188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2243.525797] RAX: ffffffffffffffda RBX: 00007f2739301f60 RCX: 00007f27391eeb19 [ 2243.527451] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000020000380 [ 2243.529097] RBP: 00007f27367641d0 R08: 0000000000000000 R09: 0000000000000000 [ 2243.530743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2243.532380] R13: 00007ffdf1fda73f R14: 00007f2736764300 R15: 0000000000022000 02:21:36 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 3) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:21:36 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x0, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2243.577212] FAULT_INJECTION: forcing a failure. [ 2243.577212] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2243.578717] CPU: 0 PID: 12240 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 2243.579522] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2243.580485] Call Trace: [ 2243.580800] dump_stack+0x107/0x167 [ 2243.581248] should_fail.cold+0x5/0xa [ 2243.581724] strncpy_from_user+0x34/0x470 [ 2243.582228] getname_flags.part.0+0x95/0x4f0 [ 2243.582755] getname_flags+0x9a/0xe0 [ 2243.583191] __x64_sys_rename+0x56/0xa0 [ 2243.583659] do_syscall_64+0x33/0x40 [ 2243.584097] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2243.584694] RIP: 0033:0x7ff904be4b19 [ 2243.585129] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2243.587298] RSP: 002b:00007ff90215a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2243.588187] RAX: ffffffffffffffda RBX: 00007ff904cf7f60 RCX: 00007ff904be4b19 [ 2243.589024] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2243.589863] RBP: 00007ff90215a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2243.590708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2243.591550] R13: 00007ffff65566bf R14: 00007ff90215a300 R15: 0000000000022000 [ 2243.630827] 9pnet: Insufficient options for proto=fd [ 2243.640627] 9pnet: Insufficient options for proto=fd 02:21:48 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') (fail_nth: 3) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) 02:21:48 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x0, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:21:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x802c2, 0x100) timerfd_gettime(r0, 0x0) r1 = accept4$packet(r0, &(0x7f0000000000), &(0x7f0000000080)=0x14, 0x81000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x3, 0x4, 0x100000000, 0x7fff}) 02:21:48 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c8", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:21:48 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x0, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2255.995789] FAULT_INJECTION: forcing a failure. [ 2255.995789] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2255.998788] CPU: 1 PID: 12250 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 2256.000360] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2256.002217] Call Trace: [ 2256.002820] dump_stack+0x107/0x167 [ 2256.003654] should_fail.cold+0x5/0xa [ 2256.004521] strncpy_from_user+0x34/0x470 [ 2256.005458] getname_flags.part.0+0x95/0x4f0 [ 2256.006464] getname_flags+0x9a/0xe0 [ 2256.007321] __x64_sys_rename+0x56/0xa0 [ 2256.008219] do_syscall_64+0x33/0x40 [ 2256.009067] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2256.010231] RIP: 0033:0x7f27391eeb19 [ 2256.011094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2256.015226] RSP: 002b:00007f2736764188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2256.016933] RAX: ffffffffffffffda RBX: 00007f2739301f60 RCX: 00007f27391eeb19 [ 2256.018537] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000020000380 [ 2256.020159] RBP: 00007f27367641d0 R08: 0000000000000000 R09: 0000000000000000 [ 2256.020639] FAULT_INJECTION: forcing a failure. [ 2256.020639] name failslab, interval 1, probability 0, space 0, times 0 [ 2256.021750] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2256.021762] R13: 00007ffdf1fda73f R14: 00007f2736764300 R15: 0000000000022000 [ 2256.025872] CPU: 0 PID: 12261 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 2256.026895] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2256.028111] Call Trace: [ 2256.028503] dump_stack+0x107/0x167 [ 2256.029035] should_fail.cold+0x5/0xa [ 2256.029593] ? getname_flags.part.0+0x50/0x4f0 [ 2256.030260] should_failslab+0x5/0x20 [ 2256.030826] kmem_cache_alloc+0x5b/0x310 [ 2256.031547] ? strncpy_from_user+0x9e/0x470 [ 2256.032188] getname_flags.part.0+0x50/0x4f0 [ 2256.032830] getname_flags+0x9a/0xe0 [ 2256.033377] __x64_sys_rename+0x65/0xa0 [ 2256.033958] do_syscall_64+0x33/0x40 [ 2256.034515] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2256.035261] RIP: 0033:0x7ff904be4b19 [ 2256.035801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2256.038506] RSP: 002b:00007ff90215a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2256.039627] RAX: ffffffffffffffda RBX: 00007ff904cf7f60 RCX: 00007ff904be4b19 [ 2256.040672] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2256.041718] RBP: 00007ff90215a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2256.042749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2256.043790] R13: 00007ffff65566bf R14: 00007ff90215a300 R15: 0000000000022000 [ 2256.044625] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 02:21:48 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 8) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c5", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 02:21:48 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:21:48 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 4) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2256.061925] FAULT_INJECTION: forcing a failure. [ 2256.061925] name failslab, interval 1, probability 0, space 0, times 0 [ 2256.064768] CPU: 1 PID: 12259 Comm: syz-executor.6 Not tainted 5.10.236 #1 [ 2256.066364] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2256.068317] Call Trace: [ 2256.068945] dump_stack+0x107/0x167 [ 2256.069780] should_fail.cold+0x5/0xa [ 2256.070685] ? create_object.isra.0+0x3a/0xa20 [ 2256.071754] should_failslab+0x5/0x20 [ 2256.072634] kmem_cache_alloc+0x5b/0x310 [ 2256.073575] ? __ext4_find_entry+0x85b/0xfc0 [ 2256.074597] ? __ext4_find_entry+0x9f1/0xfc0 [ 2256.075630] create_object.isra.0+0x3a/0xa20 [ 2256.076636] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2256.077810] kmem_cache_alloc+0x159/0x310 [ 2256.078774] ? ext4_dx_find_entry+0x600/0x600 [ 2256.079830] jbd2__journal_start+0x190/0x7e0 [ 2256.080867] __ext4_journal_start_sb+0x214/0x390 [ 2256.081979] ext4_rename+0x96d/0x2bc0 [ 2256.082886] ? ext4_tmpfile+0x440/0x440 [ 2256.083811] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2256.085051] ? lock_acquire+0x197/0x470 [ 2256.085964] ? vfs_rename+0xc68/0x1510 [ 2256.086895] ? lockref_get+0x11/0x50 [ 2256.087755] ? find_held_lock+0x2c/0x110 [ 2256.088754] ? down_write+0xe0/0x160 [ 2256.089839] ext4_rename2+0x1af/0x240 [ 2256.090970] vfs_rename+0xd6c/0x1510 [ 2256.092048] ? vfs_unlink+0x8b0/0x8b0 [ 2256.093163] ? lookup_dcache+0x65/0x130 [ 2256.094174] do_renameat2+0xae1/0xbf0 [ 2256.095090] ? __ia32_sys_link+0x80/0x80 [ 2256.096038] ? __virt_addr_valid+0x170/0x5d0 [ 2256.097049] ? __check_object_size+0x319/0x440 [ 2256.098141] __x64_sys_rename+0x7d/0xa0 [ 2256.099086] do_syscall_64+0x33/0x40 [ 2256.099951] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2256.101123] RIP: 0033:0x7f864dba0b19 [ 2256.101961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2256.106195] RSP: 002b:00007f864b116188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2256.108004] RAX: ffffffffffffffda RBX: 00007f864dcb3f60 RCX: 00007f864dba0b19 [ 2256.109651] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2256.111309] RBP: 00007f864b1161d0 R08: 0000000000000000 R09: 0000000000000000 [ 2256.113013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2256.114709] R13: 00007ffeabe65e1f R14: 00007f864b116300 R15: 0000000000022000 02:21:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') (fail_nth: 4) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) [ 2256.134325] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 02:21:49 executing program 4: ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000036000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="04000000000000002e2f66696c17ce10a9fcbc2b5caa20ec5c89653100"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)="0d3bd29130f7729fa3e2734d3dd18d3766a8323e3baabf8305436240d68dae75323be1aba46e2e111c0ed6abf245442de2d988856d04d08aab047096d772a6a923d9a582", 0x44, r0}, 0x68) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) timerfd_gettime(r1, 0x0) [ 2256.157395] FAULT_INJECTION: forcing a failure. [ 2256.157395] name failslab, interval 1, probability 0, space 0, times 0 [ 2256.160110] CPU: 1 PID: 12274 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 2256.161658] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2256.163548] Call Trace: [ 2256.164169] dump_stack+0x107/0x167 [ 2256.165033] should_fail.cold+0x5/0xa [ 2256.166036] ? getname_flags.part.0+0x50/0x4f0 [ 2256.167090] should_failslab+0x5/0x20 [ 2256.167965] kmem_cache_alloc+0x5b/0x310 [ 2256.168888] ? strncpy_from_user+0x9e/0x470 [ 2256.169873] getname_flags.part.0+0x50/0x4f0 [ 2256.170896] getname_flags+0x9a/0xe0 [ 2256.171731] __x64_sys_rename+0x65/0xa0 [ 2256.172643] do_syscall_64+0x33/0x40 [ 2256.173491] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2256.174657] RIP: 0033:0x7f27391eeb19 [ 2256.175501] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2256.179648] RSP: 002b:00007f2736764188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2256.181373] RAX: ffffffffffffffda RBX: 00007f2739301f60 RCX: 00007f27391eeb19 [ 2256.182999] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000020000380 [ 2256.184604] RBP: 00007f27367641d0 R08: 0000000000000000 R09: 0000000000000000 [ 2256.186217] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2256.187825] R13: 00007ffdf1fda73f R14: 00007f2736764300 R15: 0000000000022000 [ 2256.204489] 9pnet: Insufficient options for proto=fd [ 2256.207263] 9pnet: Insufficient options for proto=fd [ 2256.211803] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2256.213635] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2256.215623] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:21:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x16d) r1 = openat(r0, &(0x7f0000000080)='./file1\x00', 0x0, 0x2) r2 = accept(r0, &(0x7f00000000c0)=@tipc=@id, &(0x7f0000000140)=0x80) sendmmsg(r2, &(0x7f00000029c0)=[{{&(0x7f0000000180)=@nl=@proc={0x10, 0x0, 0x25dfdbfd, 0x10000}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000200)="19f967725a909479bba9325aa99c76d962492af210cd2a5ed1d0762e25a021a24654e79550eb7bd176e3a8c701", 0x2d}, {&(0x7f0000000240)="755e6ac1a9b75cc5431ee16ecc55b0e0f764cc4d139a7da414241d4f08c65f34c72020c6d9d8fc4ed1f1e06b398a77b16d42e1c96d2edfd9adbb3993927cd4dd96ccdac1997dd61d0c67777b529e0836539043fe762eb2992327d7a845e62b2b345fcca8d6a845c323b7896b1b0a0417f4a39b42f34a8b6092a4c0d40f61eb368bd75b5282ef6c3dc5628a8a80e7bba755a24562a563ea88809f3353b05c392c0e2919bc3b7acd0cac706461f8e636a0c40af1b20ceb6610680cff1734b9c96b883a1c869e5fc7c849c5d0ee8926cf4921c4abf81f819b6ed604653eb474349c5f827a14b8", 0xe5}, {&(0x7f0000000340)="550bad36dd1551a17d4bb4b8c4c2f7a52c7371fd992b576eb25aeee2bb33fdac5d85bc3c57d7f01003d8a378fd7b498dbcb5bd85503fa3eeb1849b32f646d8b94ed3a723936b0736c276965301ba84a1bc0002fc7910356af6b170c3a2f6b34cde7d46e5970312ac503d76fe9b3effc543eff6eda26cd3ab83bc3ce2d17222090e2fb0c75b0e6e2300fa33e8c975fda1503a859a1517c72f749ec3889f7d41256338525a9809f8", 0xa7}, {&(0x7f0000000400)="0cf4fa8b18b6b0203423b827569e59825976806fa993c5eb6acf776b883bd248ba5b03195ce7271fa05bf14771f56485cfec9e9ce8db30ab63bb675f70c39391c78a62207cecc52483ca23dc41eb49", 0x4f}, {&(0x7f0000000480)}, {&(0x7f00000004c0)="18e0a27354ca9a85f1e368cbe2df4437d95e3eb58f8d5fa9bac797bad852cd394708bf8bc747698b4a17bfb8dab5ead51cdf57156a32a78dd0f0f97557228dbb308d9dc3c0449f6fa930a79f4dbdd610205301fc0770dbabcd38c84994b0a3f147029956763448b3b451f493861b240cf8065640081105e9880abaff1fb5f80342e4255ec342534dcb0f5009507c4f16362e2b7fb88ebb43354421c00cc1c6c4cf9331a6bf258cc93572556731b67e57efe19dcbe5d76de68e121c10a572d1a9241d279b86c2c05ea92f9c81cfa53209", 0xd0}, {&(0x7f00000005c0)="94b0b5a397bd9b9ef0910349dc809eb08bbb66f55e659800c8c33629fd7b7ff17f721c5296fb9befe44a79cf5d424e4fae04b1de84968e8e31cf64c4b650b814f523b004c6931bfd25075dac50e449c2a0ae75c4ff6ec4b94ac6c4b9dda15407d7c08010d513853446563a7db31fe2af469e9101f1af949cf195d8befc9234f3dc7835783bce2baabc5823b27d662c0138da1cc27d2819ed800d56a7", 0x9c}], 0x7, &(0x7f0000000700)=[{0xd0, 0x10f, 0x100, "19d16a7dc29398df0115ec61ae32fc9bfe85c0f8a2aaae02e542ff4fab8300975509650ad54e122395f106abdb74c2c7466881cf952e20d05af6bfe7e3190a276acb356c278262e8ea1a37cc881babe47196ec1414153ef3966ce2666c7f5241c83c17fd6b64efbe23c798b7cf87ba0701eb2dbb244ba0d32d25d3035b886740784e60b4d24b187c1599d84ba7e3dfd692860d628372672c087ddd19e705b23e0d577c3b22e46d8f394099dcd6582920ba937704e91d91f5e6"}, {0x20, 0x11, 0x6, "4db7c33e1ff1d468a54dbea877b7"}, {0x50, 0x118, 0x2, "7dbe9dcbc3a8d6dd34a848a712ba6a1f37f68d9c9c5b8bdca5e290c539c67c45c0d3c6d3db90ef50dd463bdd592dd7cf24c71a8b398f36b0c292"}, {0x68, 0x107, 0x9, "89562f135ebc62ee4d728f72a6eff940d6a8755c6706ddbfedcf6329cff56f2566b88d6b1a260b6369830f48b37a69342f3463d18cad2f9368d27225f1cba8d1a3e8b47b1172d7589140617c3270bdfca258ff6a"}, {0x60, 0x116, 0x7ff, "81ccd07e5e62e3702d9c6297296b8c3fe697672ffd7fb7228562a4abf45b4c55b07fb7a435fe0935288ab2ad7a9ab6abe448db1218cfd2991126f6dc37cd675c72fd3a31288fa58487"}, {0x38, 0x105, 0x4, "14ffcc2ae090b6ed6f578a973877d4f9b8c7f26a2a49ff697bc9ae8d01907af98ef12acbf8acd94e"}], 0x240}}, {{&(0x7f0000000940)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e20, @local}, 0x1, 0x4, 0x0, 0x4}}, 0x80, &(0x7f0000001040)=[{&(0x7f00000009c0)="86e864073a3498678940ba1c63471df2540e", 0x12}, {&(0x7f0000000a00)="e0f9826bf87c175003c5cdaed648dfb015adef20e91e8789c9224d019ee0941f460f957ebed3d324c743cf29a8ad1dbc21da3ed33fb028b5705451abbd0940928e47889b0804e72e3ba28fe94da0148c82b3cb245c4a7a4276b4aab1cdd4577fe2a00ca09970340f0730c7476bcbb84b3cfdcb946c1819f9ecf8732160d87d7cbf91bdd8beaeacbf886f5d5e2af555743079b1ac274faded23985460c1dde6", 0x9f}, {&(0x7f0000000ac0)="f5298e38173b696dcbfee25c3b3a5a9633c7dd8262ce60cc0fe8f634b1d5975b32ed732a5b75851fa4dd6544bebcd785ec439d29d6a5f3fd3721c77ffb1bf326adc297e6aac213950b7265f27ed972ac91b56c9a2440a32f87e9631d0c4fe24752d1a877b1a9ffe4787e30b384ee6419c0ffb1b94fdd23de55bcffb48e1a8e6fdac7ef0ee6a11502b183b16073c2e4857d6785a4a9d879519aff3d076980aa6f4ccd46e6a021", 0xa6}, {&(0x7f0000000b80)="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", 0xfc}, {&(0x7f0000000c80)="d7836344419e1812f88d876249e73ee89b0a6966c3f117d4e80f67dd28fd1b205031663318dccddf0c20faf3998d06c4a686ee1778c896a8ca315298b00221b0d5c129e0385f69e1a27cdd3a55f92a463a0e7ccc36e3e8f7069c1ccba7632a98f289cef015daedb182725ebf9231edd7bbfe90e73e3f3e7b0ba30a0a939b945760584e5a6397423b178efe8d", 0x8c}, {&(0x7f0000000d40)="ed6774c3788bc4142d8140d6756a7f322f", 0x11}, {&(0x7f0000000d80)="650204ddf20b018842ef08c7d5651f3e1c1331cdf1ad6bd3492ad9afc6894c6166663f7f37828a7d9304aa7f511b9fb5292adf337a7b94cbb23a5ace392538fc118cd099e132ef1e1755b7e8a0d25f06fb745bbb833f3502cfb58c99019154521aeadb5212612334f2691e443d753ba0709324e56be4a005380c49ccb767ccbeed54280bd8d499c8b7ba4cdb71dd4fe5f54da64ba8a6fc2ee095ae8fb84858e762d95d4e14104fd5fc712953bbb012c89360e3ceb6aee8637e5b4a40260e42338dea885fffe3cb741621fa0586b547f0941004c624", 0xd5}, {&(0x7f0000000e80)="23a409d7d5e43e57136e528ab1fad02f45e77447add423d58cea07667f68282e866346986161f318181afb2ea84465b8fefd72896e5e33d02d9ee862f3075051447b1c12f792f5dd9aba819cd68b83ee68adbaf39c482b65bcabd6c1a11cf6e199ac7eef933c16aeb9ad9987b5a2453fc3750c52eb1935c6d075cd2f7319c7f103", 0x81}, {&(0x7f0000000f40)="46010726522170df981e71247210b0180306bc803703ee97ff0d92597da4ac52eebeee90e748dbb2070c3b65d9e8a1929e6fba9cb60149175dcd154a8ca123fd72f8dda84e8a2323e9c4cbefa7e48bcd7f18e46a50075a0905aedd78501227b52b3f14560a3179f6c743364aac659a33dc3177a8f77e025d470f4aa89d133d1b55b71c7b0970dee4d34486e31bb0aacd7e5cd355cfdc04fb54e24d68df4808251c6ffd030dec54e808fc466283808e8dd36fddc04efb02f334446031", 0xbc}, {&(0x7f0000001000)="0b7cf72d23e5088c99e5656510e37669f4cdf622dc1cdaf8fca77a958d8103411253f49686c954ee", 0x28}], 0xa, &(0x7f0000001100)=[{0x90, 0xff, 0xa9, "c2c709f579bba943a83ca932ee9ac9d552bf3a74a209e10c0cac22653f233a84ef618d03f2bb4e4cbf76a2506822e777832619898a255d2724fd6d8e7317bac67c552e9cd7eda033b6dbb7d66ccb28879b2a494dec2c9f448ac3cfd2ffd81caa46a7621fc69aa4347d8c5ed36aff552c596c6b29e3cfe26f57652b66df84"}, {0x68, 0x1, 0x81, "9aa8ef64fd1f89da31e0d70263e9eeaef8a59d11c8b0bc868bcf736678c9406316d744352f2c2a180ba4b749d9089cc4d52e389164f1bb0a97f05fc4becec0b49b15a36babd65b02d600b976535a66aec0c3"}, {0x100, 0x3a, 0x1, "4d3fd90b4d364a6f64a9f677a9da75f54befe677c92370d0ba6d7b015ea1e8783c1fcd4a2118a935ad6a0b6eae77b91ccc169adc021b39b13845c68bc6e685fe1f043e1743daddbb20c6ec10f25b68093f5bbecdb624cebe382542106a24d1dc17b83a843c2dc4544e31f873db9b63ac85a1f4ed9d3d40f5b60f44113ff0717600d0c5d7f852fa8c89dec6d44439ab544d81931a54a20344c35879fd8260748ec1452319f7c7cdc5e11ff115cd2257f887d1c25444a6664637e7a8462a64a487e761a7d54dec9becd4a64b56be1a4a0397bf7bfa41953c893630c7e81d085b01bec703e98543c3dde7824ece3b"}, {0x100, 0x10f, 0x0, "ae33a21221a956899076bc66dd3ef13212cea2f5acb802395fbbcc9cac611c124f6ab98c43e089227d1a675ee47ad70fc4b9c36ac264e12176050f8fab0a6f14ac28e1af6ba00ed9e127480dc700e723c54a1eaa2c9caa5ceef2ecfa61f360b4d6b8c840819d735faa1c935055547f79bcd011555d949dc78e496ec03a1476ab861b5726712e85de0be82fd3e287661392b5f183e61a20fc7d23223604fb32d6e9ee16e2b88f93856bcbefd1fb3d3b1a876adde10322e088988c2fd39730b28e491b0fbbc9036e550ed33fa72e206d2d027081349472caa82e4ab633a6ae6996e19336c611f1634fc8"}, {0xc0, 0x3a, 0x0, "b80077b267e92ee36e6f72dbc2c2ea973d92015dab9c45d577bbb972886583e9230d40783f6e6104ee07a2ee995971681230cb79c2d1a3e0e191493c68755e438dba92be42f0959776dec8cacf51b3c98723afe12ba1243216b6466faffee268e2f3693f90e80bf58934d1f27570f391b55197aa2eccf847973ecf1880ae40ea5c1369aa99030a1978c45034294b13b4fe7d1603ad17b9e153bdac58f127c6d4e9e7a2aa21830bd6fec0"}], 0x3b8}}, {{&(0x7f00000014c0)=@hci={0x1f, 0x3}, 0x80, &(0x7f0000001680)=[{&(0x7f0000001540)="afdb27d413f89cc5c789bd871f0bfa53acacee4c28f3bca050c6b410c4f506dd7a13839764661adbafc82c456c6062e311b4927484e441a9ff108e2cf9a9f620c0590b0a4b9db89c492310e789fddb85ef709fdc0b2c8f39f88b0325aa3b3554fab4d8b8b9948b892e6ef1897bdd02f15a31abae4ec89427dae644aef08af37695e4b030835d3463393ecce5761e1b7f6d2f5e7b4be9bb508645d91bda39bcb04d1d1feed5b17cb17e11b3e3cc00647a12c1208cbf6c83dffbf7c54ae7bc47a0946a1cab94eeb05277ca785a64aa8e39d20cf220747f908311f8e785f0888909f7930e779620f31b133cc2c451676ad53aa09366e3c2c9", 0xf7}, {&(0x7f0000001640)="4b0bbd2285626983a818f32a8f11087cc32eda93afa6bff05dc54772a2b85817df110799c7ca64020a83e9ef82060e", 0x2f}], 0x2, &(0x7f00000016c0)=[{0x98, 0x105, 0x9b65, "aab4ab7ff318d4959bad94816264cc3514895fd093e437a2129a9dd009838b1b1f4d23a3844563d174c1bc94c51b68cc2234d839855164b67ddc260ea25fc9d69d11f7a9df72728fc61e78f6f6dfde0d8df318876c86ad5bf6a293d326c558cc25c67c38b51121c7da167bc39c223ab529478a4d147f7337b45c80d70f284dc3e72a9f"}, {0xf8, 0x104, 0x4, "c24e5dfcb45189aae0f906d32fdb606873231aab5aecade6f6af304f80da063dd374a7905e63b953585aaa5d959a46011ebd376fd97a97d719d31d09755a4c025ab2fe25d4408f15fbd25c145e698bd4bddd01c35b6ca9ab3055ffdbb9d8b01d3cbb633158d557cdf11677b6080000f3301dc8f3538633c86d4afb766e99bfec93861659a974c3cbcc9451df684db39de4c606aff3624ec742c05e7626923a95d00d48a23f591df631f2511d9cb5793415e21cdce629de16ff65e74de24240ea5227f61b09725a8df12704034a02b99ff6ef6c3a879c0fa72ce0b86541404b6f6fe869b3"}, {0x58, 0x10b, 0x8, "0afc94ae3ddbd483c0a10f334bf06df00c613d963f4d6308a177cd1e8b43f90c2f28bea9920ced3e450040c5aa36568d10c3a1b2f0ff2179072d54260dab9b699656"}, {0x1010, 0x108, 0x7fff, "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"}, {0xd8, 0xff, 0x0, "c156b757b80e42262a2632bf36d7cd7bb05470c4e1756f5496c938a9bb0ba036a4b6ecee1e004e66addd3048ebdb1ad4473190009ac61e38b99ea4177f5d583b2d7f4a152f3f36016cf426c0d88d4003e3bb5f98c7b65d5845d0d66995299c2cc2727d05fdf480b5eab00b8fc48c70f3f7516cde54b21778cba61927f325c046236a35d960bb33883b11c5f2371766adc716d68b601781f75a7df6bc1df8e4121abf7ef66d158cac2e13fa74fc91ebd7f0ed02d2947565c78962555279a3fc5804393ca3"}], 0x12d0}}], 0x3, 0x0) openat(r0, &(0x7f0000000040)='./file1\x00', 0x408000, 0x128) timerfd_gettime(r0, 0x0) [ 2256.227158] 9pnet: Insufficient options for proto=fd [ 2256.237532] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2256.239342] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2256.245270] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:21:49 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c5", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:21:49 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x0, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:21:49 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 5) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:21:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 9) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c5", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) [ 2256.321050] FAULT_INJECTION: forcing a failure. [ 2256.321050] name failslab, interval 1, probability 0, space 0, times 0 [ 2256.322679] CPU: 0 PID: 12287 Comm: syz-executor.6 Not tainted 5.10.236 #1 [ 2256.323513] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2256.324503] Call Trace: [ 2256.324821] dump_stack+0x107/0x167 [ 2256.325258] should_fail.cold+0x5/0xa [ 2256.325713] ? jbd2__journal_start+0x190/0x7e0 [ 2256.326260] should_failslab+0x5/0x20 [ 2256.326724] kmem_cache_alloc+0x5b/0x310 [ 2256.327210] jbd2__journal_start+0x190/0x7e0 [ 2256.327738] __ext4_journal_start_sb+0x214/0x390 [ 2256.328305] ext4_evict_inode+0x8f4/0x1a60 [ 2256.328814] ? ext4_da_write_begin+0xd40/0xd40 [ 2256.329364] ? rwlock_bug.part.0+0x90/0x90 [ 2256.329872] ? ext4_da_write_begin+0xd40/0xd40 [ 2256.330424] evict+0x32b/0x8c0 [ 2256.330811] ? new_inode+0x250/0x250 [ 2256.331253] ? lock_downgrade+0x6d0/0x6d0 [ 2256.331749] ? rwlock_bug.part.0+0x90/0x90 [ 2256.332256] ? fsnotify_grab_connector+0x11a/0x250 [ 2256.332853] iput.part.0+0x4b9/0x6d0 [ 2256.333304] ? trace_event_raw_event_ext4_es_lookup_extent_enter+0x300/0x300 [ 2256.334155] iput+0x58/0x70 [ 2256.334518] dentry_unlink_inode+0x2bb/0x470 [ 2256.335048] __dentry_kill+0x36f/0x5c0 [ 2256.335518] ? dput+0x35/0xcd0 [ 2256.335904] dput+0x6f4/0xcd0 [ 2256.336289] do_renameat2+0x715/0xbf0 [ 2256.336748] ? __ia32_sys_link+0x80/0x80 [ 2256.337240] ? __virt_addr_valid+0x170/0x5d0 [ 2256.337768] ? __check_object_size+0x319/0x440 [ 2256.338332] __x64_sys_rename+0x7d/0xa0 [ 2256.338818] do_syscall_64+0x33/0x40 [ 2256.339269] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2256.339883] RIP: 0033:0x7f864dba0b19 [ 2256.340326] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2256.342562] RSP: 002b:00007f864b116188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2256.343493] RAX: ffffffffffffffda RBX: 00007f864dcb3f60 RCX: 00007f864dba0b19 [ 2256.343723] 9pnet: Insufficient options for proto=fd [ 2256.344343] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2256.344364] RBP: 00007f864b1161d0 R08: 0000000000000000 R09: 0000000000000000 [ 2256.344369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2256.344375] R13: 00007ffeabe65e1f R14: 00007f864b116300 R15: 0000000000022000 [ 2256.344724] EXT4-fs error (device sda) in ext4_evict_inode:257: Out of memory [ 2256.372977] FAULT_INJECTION: forcing a failure. [ 2256.372977] name failslab, interval 1, probability 0, space 0, times 0 [ 2256.374604] CPU: 0 PID: 12289 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 2256.375437] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2256.376431] Call Trace: [ 2256.376749] dump_stack+0x107/0x167 [ 2256.377183] should_fail.cold+0x5/0xa [ 2256.377645] ? create_object.isra.0+0x3a/0xa20 [ 2256.378190] should_failslab+0x5/0x20 [ 2256.378651] kmem_cache_alloc+0x5b/0x310 [ 2256.379138] create_object.isra.0+0x3a/0xa20 [ 2256.379664] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2256.380548] kmem_cache_alloc+0x159/0x310 [ 2256.381051] getname_flags.part.0+0x50/0x4f0 [ 2256.381581] getname_flags+0x9a/0xe0 [ 2256.382029] __x64_sys_rename+0x65/0xa0 [ 2256.382517] do_syscall_64+0x33/0x40 [ 2256.382965] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2256.383578] RIP: 0033:0x7ff904be4b19 [ 2256.384026] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2256.386241] RSP: 002b:00007ff90215a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2256.387162] RAX: ffffffffffffffda RBX: 00007ff904cf7f60 RCX: 00007ff904be4b19 [ 2256.388017] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2256.388865] RBP: 00007ff90215a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2256.389731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2256.390599] R13: 00007ffff65566bf R14: 00007ff90215a300 R15: 0000000000022000 [ 2256.417987] 9pnet: Insufficient options for proto=fd [ 2256.422532] 9pnet: Insufficient options for proto=fd 02:22:03 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 6) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:22:03 executing program 4: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000040)={[0x2]}, 0x8) r1 = openat(r0, &(0x7f0000000080)='./file1\x00', 0x802c2, 0x0) timerfd_gettime(r1, 0x0) 02:22:03 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x0, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:22:03 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') (fail_nth: 5) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) 02:22:03 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:22:03 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:22:03 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c5", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:22:03 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 10) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c5", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) [ 2270.587229] FAULT_INJECTION: forcing a failure. [ 2270.587229] name failslab, interval 1, probability 0, space 0, times 0 [ 2270.589783] CPU: 1 PID: 12307 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 2270.591299] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2270.593101] Call Trace: [ 2270.593675] dump_stack+0x107/0x167 [ 2270.594473] should_fail.cold+0x5/0xa [ 2270.595307] ? create_object.isra.0+0x3a/0xa20 [ 2270.596308] should_failslab+0x5/0x20 [ 2270.597133] kmem_cache_alloc+0x5b/0x310 [ 2270.598026] create_object.isra.0+0x3a/0xa20 [ 2270.598992] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2270.600102] kmem_cache_alloc+0x159/0x310 [ 2270.601003] ? strncpy_from_user+0x9e/0x470 [ 2270.601946] getname_flags.part.0+0x50/0x4f0 [ 2270.602917] getname_flags+0x9a/0xe0 [ 2270.603729] __x64_sys_rename+0x65/0xa0 [ 2270.604593] do_syscall_64+0x33/0x40 [ 2270.605398] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2270.606511] RIP: 0033:0x7f27391eeb19 [ 2270.607334] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2270.610684] FAULT_INJECTION: forcing a failure. [ 2270.610684] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2270.611344] RSP: 002b:00007f2736764188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2270.611365] RAX: ffffffffffffffda RBX: 00007f2739301f60 RCX: 00007f27391eeb19 [ 2270.611376] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000020000380 [ 2270.611386] RBP: 00007f27367641d0 R08: 0000000000000000 R09: 0000000000000000 [ 2270.611396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2270.611406] R13: 00007ffdf1fda73f R14: 00007f2736764300 R15: 0000000000022000 [ 2270.625300] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2270.625751] CPU: 0 PID: 12305 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 2270.629262] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2270.631379] Call Trace: [ 2270.632048] dump_stack+0x107/0x167 [ 2270.632971] should_fail.cold+0x5/0xa [ 2270.633940] strncpy_from_user+0x34/0x470 [ 2270.635015] getname_flags.part.0+0x95/0x4f0 [ 2270.636119] getname_flags+0x9a/0xe0 [ 2270.637054] __x64_sys_rename+0x65/0xa0 [ 2270.638052] do_syscall_64+0x33/0x40 [ 2270.638985] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2270.640237] RIP: 0033:0x7ff904be4b19 [ 2270.641141] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2270.645659] RSP: 002b:00007ff90215a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2270.647543] RAX: ffffffffffffffda RBX: 00007ff904cf7f60 RCX: 00007ff904be4b19 [ 2270.649282] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 02:22:03 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') (fail_nth: 6) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) [ 2270.651020] RBP: 00007ff90215a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2270.652893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2270.654674] R13: 00007ffff65566bf R14: 00007ff90215a300 R15: 0000000000022000 [ 2270.671718] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2270.679850] FAULT_INJECTION: forcing a failure. [ 2270.679850] name failslab, interval 1, probability 0, space 0, times 0 [ 2270.682638] CPU: 1 PID: 12314 Comm: syz-executor.6 Not tainted 5.10.236 #1 [ 2270.684165] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2270.685980] Call Trace: [ 2270.686561] dump_stack+0x107/0x167 [ 2270.687372] should_fail.cold+0x5/0xa [ 2270.688205] ? create_object.isra.0+0x3a/0xa20 [ 2270.689208] should_failslab+0x5/0x20 [ 2270.690038] kmem_cache_alloc+0x5b/0x310 [ 2270.690932] create_object.isra.0+0x3a/0xa20 [ 2270.691885] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2270.693008] kmem_cache_alloc+0x159/0x310 [ 2270.693916] jbd2__journal_start+0x190/0x7e0 [ 2270.694887] __ext4_journal_start_sb+0x214/0x390 [ 2270.695921] ext4_evict_inode+0x8f4/0x1a60 [ 2270.696845] ? ext4_da_write_begin+0xd40/0xd40 [ 2270.697832] ? rwlock_bug.part.0+0x90/0x90 [ 2270.698772] ? ext4_da_write_begin+0xd40/0xd40 [ 2270.699764] evict+0x32b/0x8c0 [ 2270.700462] ? new_inode+0x250/0x250 [ 2270.701282] ? lock_downgrade+0x6d0/0x6d0 [ 2270.702179] ? rwlock_bug.part.0+0x90/0x90 [ 2270.703106] ? fsnotify_grab_connector+0x11a/0x250 [ 2270.704183] iput.part.0+0x4b9/0x6d0 [ 2270.704995] ? trace_event_raw_event_ext4_es_lookup_extent_enter+0x300/0x300 [ 2270.706552] iput+0x58/0x70 [ 2270.707207] dentry_unlink_inode+0x2bb/0x470 [ 2270.708168] __dentry_kill+0x36f/0x5c0 [ 2270.709018] ? dput+0x35/0xcd0 [ 2270.709723] dput+0x6f4/0xcd0 [ 2270.710412] do_renameat2+0x715/0xbf0 [ 2270.711254] ? __ia32_sys_link+0x80/0x80 [ 2270.712155] ? __virt_addr_valid+0x170/0x5d0 [ 2270.713119] ? __check_object_size+0x319/0x440 [ 2270.714143] __x64_sys_rename+0x7d/0xa0 [ 2270.715012] do_syscall_64+0x33/0x40 [ 2270.715821] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2270.716932] RIP: 0033:0x7f864dba0b19 [ 2270.717744] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2270.721743] RSP: 002b:00007f864b116188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2270.723401] RAX: ffffffffffffffda RBX: 00007f864dcb3f60 RCX: 00007f864dba0b19 [ 2270.724955] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2270.726510] RBP: 00007f864b1161d0 R08: 0000000000000000 R09: 0000000000000000 [ 2270.728074] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2270.729633] R13: 00007ffeabe65e1f R14: 00007f864b116300 R15: 0000000000022000 02:22:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x220200, 0xc) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000040)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x8000, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2c, &(0x7f0000000280)={0x5, {{0xa, 0x4e21, 0x80000001, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x2}}, {{0xa, 0x4e22, 0xfffffff7, @rand_addr=' \x01\x00', 0x7f}}}, 0x108) timerfd_gettime(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r4 = syz_io_uring_setup(0x68d4, &(0x7f0000000100), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r4, 0x0, &(0x7f0000000000)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_BUFFERS(r4, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000000b40)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="3f000000000000002e2f592158dc3a00"]) r5 = syz_io_uring_setup(0x68d4, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x4000000}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r5, 0x0, &(0x7f0000000000)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_BUFFERS(r5, 0x0, 0x0, 0x0) fstatfs(r5, &(0x7f00000003c0)=""/196) r6 = syz_open_dev$vcsa(&(0x7f00000004c0), 0x7, 0x400100) preadv2(r6, &(0x7f0000000ac0)=[{&(0x7f0000000500)=""/239, 0xef}, {&(0x7f0000000600)=""/126, 0x7e}, {&(0x7f0000000680)=""/143, 0x8f}, {&(0x7f0000000740)=""/158, 0x9e}, {&(0x7f0000000800)=""/19, 0x13}, {&(0x7f0000000840)=""/234, 0xea}, {&(0x7f0000000940)=""/196, 0xc4}, {&(0x7f0000000a40)=""/104, 0x68}], 0x8, 0x800, 0xfff, 0x19) [ 2270.791500] 9pnet: Insufficient options for proto=fd [ 2270.803749] 9pnet: Insufficient options for proto=fd [ 2270.811316] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2270.812920] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2270.814690] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2270.814812] FAULT_INJECTION: forcing a failure. [ 2270.814812] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2270.818973] CPU: 0 PID: 12328 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 2270.820516] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2270.822365] Call Trace: [ 2270.822963] dump_stack+0x107/0x167 [ 2270.823783] should_fail.cold+0x5/0xa [ 2270.824644] strncpy_from_user+0x34/0x470 [ 2270.825582] getname_flags.part.0+0x95/0x4f0 [ 2270.826584] getname_flags+0x9a/0xe0 [ 2270.827406] __x64_sys_rename+0x65/0xa0 [ 2270.828294] do_syscall_64+0x33/0x40 [ 2270.829124] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2270.830262] RIP: 0033:0x7f27391eeb19 [ 2270.831092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2270.835172] RSP: 002b:00007f2736764188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2270.836853] RAX: ffffffffffffffda RBX: 00007f2739301f60 RCX: 00007f27391eeb19 [ 2270.838435] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000020000380 [ 2270.840006] RBP: 00007f27367641d0 R08: 0000000000000000 R09: 0000000000000000 [ 2270.841577] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2270.843141] R13: 00007ffdf1fda73f R14: 00007f2736764300 R15: 0000000000022000 [ 2270.847453] 9pnet: Insufficient options for proto=fd [ 2270.856749] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2270.858771] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 02:22:03 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x0, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2270.861759] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:22:03 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x90, r0, 0x2, 0x70bd26, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x0, 0x47}}}}, [@NL80211_ATTR_KEYS={0x6c, 0x51, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NL80211_KEY_DEFAULT={0x4}]}, {0x34, 0x0, 0x0, 0x1, [@NL80211_KEY_DATA_WEP40={0x9, 0x1, "58d681625b"}, @NL80211_KEY_SEQ={0xe, 0x4, "0bed58cf2cb475414010"}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "19bbadd3bada1862420ff91ca7"}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_KEY_MODE={0x5, 0x9, 0x2}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "c9ed343e9b"}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "98d8fd6f524214cfad946546ee"}]}]}, @NL80211_ATTR_PRIVACY={0x4}]}, 0x90}, 0x1, 0x0, 0x0, 0x408c}, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) timerfd_gettime(r1, 0x0) 02:22:03 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:22:03 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r4 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:22:03 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c5", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2270.952434] 9pnet: Insufficient options for proto=fd 02:22:03 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 11) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c5", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 02:22:03 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 7) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2270.989368] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 02:22:03 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') (fail_nth: 7) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) [ 2271.025583] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2271.071336] 9pnet: Insufficient options for proto=fd [ 2271.086115] FAULT_INJECTION: forcing a failure. [ 2271.086115] name failslab, interval 1, probability 0, space 0, times 0 [ 2271.089825] CPU: 0 PID: 12343 Comm: syz-executor.6 Not tainted 5.10.236 #1 [ 2271.091507] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2271.093504] Call Trace: [ 2271.094141] dump_stack+0x107/0x167 [ 2271.095024] should_fail.cold+0x5/0xa [ 2271.095939] ? create_object.isra.0+0x3a/0xa20 [ 2271.097039] should_failslab+0x5/0x20 [ 2271.097951] kmem_cache_alloc+0x5b/0x310 [ 2271.098925] ? __kasan_slab_free+0x122/0x160 [ 2271.099988] create_object.isra.0+0x3a/0xa20 [ 2271.101040] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2271.102257] __kmalloc+0x16e/0x390 [ 2271.103109] ? __ext4_journal_start_sb+0x1db/0x390 [ 2271.104284] ext4_ext_remove_space+0x15af/0x3d90 [ 2271.105435] ? ext4_es_remove_extent+0x2f2/0x450 [ 2271.106569] ? do_raw_read_unlock+0x70/0x70 [ 2271.107611] ? ext4_da_release_space+0x21/0x480 [ 2271.108716] ? ext4_ext_index_trans_blocks+0x170/0x170 [ 2271.109973] ? ext4_es_lookup_extent+0xaa0/0xaa0 [ 2271.111111] ? down_write+0xe0/0x160 [ 2271.112000] ? down_write_killable+0x180/0x180 [ 2271.113087] ext4_ext_truncate+0x1ea/0x250 [ 2271.114083] ext4_truncate+0xc38/0x1160 [ 2271.115037] ? ext4_punch_hole+0x1070/0x1070 [ 2271.116075] ? __ext4_journal_start_sb+0x214/0x390 [ 2271.117235] ? __ext4_journal_start_sb+0x1db/0x390 [ 2271.118400] ext4_evict_inode+0xae0/0x1a60 [ 2271.119410] ? ext4_da_write_begin+0xd40/0xd40 [ 2271.120489] ? rwlock_bug.part.0+0x90/0x90 [ 2271.121496] ? ext4_da_write_begin+0xd40/0xd40 [ 2271.122588] evict+0x32b/0x8c0 [ 2271.123344] ? new_inode+0x250/0x250 [ 2271.124220] ? lock_downgrade+0x6d0/0x6d0 [ 2271.125195] ? rwlock_bug.part.0+0x90/0x90 [ 2271.126193] ? fsnotify_grab_connector+0x11a/0x250 [ 2271.127378] iput.part.0+0x4b9/0x6d0 [ 2271.128255] ? trace_event_raw_event_ext4_es_lookup_extent_enter+0x300/0x300 [ 2271.129924] iput+0x58/0x70 [ 2271.130630] dentry_unlink_inode+0x2bb/0x470 [ 2271.131669] __dentry_kill+0x36f/0x5c0 [ 2271.132588] ? dput+0x35/0xcd0 [ 2271.133342] dput+0x6f4/0xcd0 [ 2271.134087] do_renameat2+0x715/0xbf0 [ 2271.134997] ? __ia32_sys_link+0x80/0x80 [ 2271.135953] ? __virt_addr_valid+0x170/0x5d0 [ 2271.136979] ? __check_object_size+0x319/0x440 [ 2271.138091] __x64_sys_rename+0x7d/0xa0 [ 2271.139035] do_syscall_64+0x33/0x40 [ 2271.139902] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2271.141094] RIP: 0033:0x7f864dba0b19 [ 2271.141965] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2271.146251] RSP: 002b:00007f864b116188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2271.148033] RAX: ffffffffffffffda RBX: 00007f864dcb3f60 RCX: 00007f864dba0b19 [ 2271.149689] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2271.151349] RBP: 00007f864b1161d0 R08: 0000000000000000 R09: 0000000000000000 [ 2271.153011] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2271.154672] R13: 00007ffeabe65e1f R14: 00007f864b116300 R15: 0000000000022000 [ 2271.177700] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2271.179401] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2271.181176] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2271.188958] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2271.190628] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2271.192895] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2271.204434] 9pnet: Insufficient options for proto=fd [ 2271.241758] FAULT_INJECTION: forcing a failure. [ 2271.241758] name failslab, interval 1, probability 0, space 0, times 0 [ 2271.244434] CPU: 1 PID: 12345 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 2271.246035] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2271.247857] Call Trace: [ 2271.248436] dump_stack+0x107/0x167 [ 2271.249230] should_fail.cold+0x5/0xa [ 2271.250062] ? jbd2__journal_start+0x190/0x7e0 [ 2271.251068] should_failslab+0x5/0x20 [ 2271.251901] kmem_cache_alloc+0x5b/0x310 [ 2271.252783] ? ext4_dx_find_entry+0x600/0x600 [ 2271.253763] jbd2__journal_start+0x190/0x7e0 [ 2271.254737] __ext4_journal_start_sb+0x214/0x390 [ 2271.255784] ext4_rename+0x96d/0x2bc0 [ 2271.256621] ? ext4_tmpfile+0x440/0x440 [ 2271.257490] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2271.258645] ? lock_acquire+0x197/0x470 [ 2271.259507] ? vfs_rename+0xc68/0x1510 [ 2271.260367] ? lockref_get+0x11/0x50 [ 2271.261175] ? find_held_lock+0x2c/0x110 [ 2271.262073] ? down_write+0xe0/0x160 [ 2271.262897] ext4_rename2+0x1af/0x240 [ 2271.263729] vfs_rename+0xd6c/0x1510 [ 2271.264548] ? vfs_unlink+0x8b0/0x8b0 [ 2271.265385] ? lookup_dcache+0x65/0x130 [ 2271.266259] do_renameat2+0xae1/0xbf0 [ 2271.267107] ? __ia32_sys_link+0x80/0x80 [ 2271.267997] ? __virt_addr_valid+0x170/0x5d0 [ 2271.268957] ? __check_object_size+0x319/0x440 [ 2271.269986] __x64_sys_rename+0x7d/0xa0 [ 2271.270864] do_syscall_64+0x33/0x40 [ 2271.271670] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2271.272785] RIP: 0033:0x7ff904be4b19 [ 2271.273592] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2271.277594] RSP: 002b:00007ff90215a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2271.279262] RAX: ffffffffffffffda RBX: 00007ff904cf7f60 RCX: 00007ff904be4b19 [ 2271.280815] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2271.282359] RBP: 00007ff90215a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2271.283912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2271.285460] R13: 00007ffff65566bf R14: 00007ff90215a300 R15: 0000000000022000 [ 2271.294638] FAULT_INJECTION: forcing a failure. [ 2271.294638] name failslab, interval 1, probability 0, space 0, times 0 [ 2271.297402] CPU: 1 PID: 12350 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 2271.298913] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2271.300716] Call Trace: [ 2271.301285] dump_stack+0x107/0x167 [ 2271.302082] should_fail.cold+0x5/0xa [ 2271.302921] ? __d_alloc+0x2a/0x990 [ 2271.303715] should_failslab+0x5/0x20 [ 2271.304549] kmem_cache_alloc+0x5b/0x310 [ 2271.305431] ? __d_lookup+0x3bf/0x760 [ 2271.306268] __d_alloc+0x2a/0x990 [ 2271.307034] d_alloc+0x46/0x1c0 [ 2271.307750] __lookup_hash+0xcc/0x190 [ 2271.308579] do_renameat2+0x498/0xbf0 [ 2271.309412] ? __ia32_sys_link+0x80/0x80 [ 2271.310298] ? __virt_addr_valid+0x170/0x5d0 [ 2271.311271] ? __check_object_size+0x319/0x440 [ 2271.312280] ? getname_flags.part.0+0x1dd/0x4f0 [ 2271.313299] __x64_sys_rename+0x7d/0xa0 [ 2271.314161] do_syscall_64+0x33/0x40 [ 2271.314976] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2271.316085] RIP: 0033:0x7f27391eeb19 [ 2271.316892] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2271.320907] RSP: 002b:00007f2736743188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2271.322564] RAX: ffffffffffffffda RBX: 00007f2739302020 RCX: 00007f27391eeb19 [ 2271.324119] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000020000380 [ 2271.325673] RBP: 00007f27367431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2271.327226] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2271.328775] R13: 00007ffdf1fda73f R14: 00007f2736743300 R15: 0000000000022000 02:22:17 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 12) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c5", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 02:22:17 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 8) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:22:17 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r4 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:22:17 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x0, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:22:17 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b01", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:22:17 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:22:17 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') (fail_nth: 8) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) [ 2284.190804] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 02:22:17 executing program 4: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="281100004d022048cdb5a0c92ff3fb86a41cdc5a5636bef1c933982e63f862c694de6772bd10d00bd59ae028c21d71c7ff2bca29d0f173969264ec7fe3e0415752274d58a2bea4f924a9604bb0b0b20b0285bbe15a7387d11e382c70c9d010bbb580db5699f9515277161df3d8de3a6c7f854bd5050ec35986d3855055c3866a0a32b34ba626cdfa9f73d2c08da7cf138c480d4ed10e1dc192ece00fc9db6aa654227c7b3c6a2aa689424b6fa2d7d7665ab2ee80409da84ccb72c4", @ANYRES16=r0, @ANYBLOB="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"], 0x128}, 0x1, 0x0, 0x0, 0x4000044}, 0x20000843) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x20801, 0x1) timerfd_gettime(r1, 0x0) [ 2284.204463] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2284.222806] FAULT_INJECTION: forcing a failure. [ 2284.222806] name failslab, interval 1, probability 0, space 0, times 0 [ 2284.224562] CPU: 1 PID: 12373 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 2284.225427] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2284.226463] Call Trace: [ 2284.226815] dump_stack+0x107/0x167 [ 2284.227284] should_fail.cold+0x5/0xa [ 2284.227762] ? create_object.isra.0+0x3a/0xa20 [ 2284.228342] should_failslab+0x5/0x20 [ 2284.228821] kmem_cache_alloc+0x5b/0x310 [ 2284.229336] ? __ext4_find_entry+0x85b/0xfc0 [ 2284.229888] ? __ext4_find_entry+0x9f1/0xfc0 [ 2284.230445] create_object.isra.0+0x3a/0xa20 [ 2284.230999] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2284.231641] kmem_cache_alloc+0x159/0x310 [ 2284.232162] ? ext4_dx_find_entry+0x600/0x600 [ 2284.232725] jbd2__journal_start+0x190/0x7e0 [ 2284.233275] __ext4_journal_start_sb+0x214/0x390 [ 2284.233873] ext4_rename+0x96d/0x2bc0 [ 2284.234351] ? ext4_tmpfile+0x440/0x440 [ 2284.234864] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2284.235515] ? lock_acquire+0x197/0x470 [ 2284.236011] ? vfs_rename+0xc68/0x1510 [ 2284.236503] ? lockref_get+0x11/0x50 [ 2284.236965] ? find_held_lock+0x2c/0x110 [ 2284.237478] ? down_write+0xe0/0x160 [ 2284.237946] ext4_rename2+0x1af/0x240 [ 2284.238423] vfs_rename+0xd6c/0x1510 [ 2284.238902] ? vfs_unlink+0x8b0/0x8b0 [ 2284.239380] ? lookup_dcache+0x65/0x130 [ 2284.239882] do_renameat2+0xae1/0xbf0 [ 2284.240363] ? __ia32_sys_link+0x80/0x80 [ 2284.240875] ? __virt_addr_valid+0x170/0x5d0 [ 2284.241426] ? __check_object_size+0x319/0x440 [ 2284.242014] __x64_sys_rename+0x7d/0xa0 [ 2284.242518] do_syscall_64+0x33/0x40 [ 2284.242987] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2284.243620] RIP: 0033:0x7ff904be4b19 [ 2284.244081] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2284.246387] RSP: 002b:00007ff90215a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2284.247340] RAX: ffffffffffffffda RBX: 00007ff904cf7f60 RCX: 00007ff904be4b19 [ 2284.248233] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2284.249131] RBP: 00007ff90215a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2284.250021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2284.250924] R13: 00007ffff65566bf R14: 00007ff90215a300 R15: 0000000000022000 [ 2284.266517] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2284.268349] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2284.271559] FAULT_INJECTION: forcing a failure. [ 2284.271559] name failslab, interval 1, probability 0, space 0, times 0 [ 2284.273608] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2284.274314] CPU: 0 PID: 12376 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 2284.274971] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2284.276519] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2284.276526] Call Trace: [ 2284.276552] dump_stack+0x107/0x167 [ 2284.276575] should_fail.cold+0x5/0xa [ 2284.280011] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2284.280638] ? create_object.isra.0+0x3a/0xa20 [ 2284.280662] should_failslab+0x5/0x20 [ 2284.284421] kmem_cache_alloc+0x5b/0x310 [ 2284.285350] create_object.isra.0+0x3a/0xa20 [ 2284.286339] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2284.287498] kmem_cache_alloc+0x159/0x310 [ 2284.288435] ? __d_lookup+0x3bf/0x760 [ 2284.289301] __d_alloc+0x2a/0x990 [ 2284.290089] d_alloc+0x46/0x1c0 [ 2284.290507] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2284.290858] __lookup_hash+0xcc/0x190 [ 2284.292513] do_renameat2+0x498/0xbf0 [ 2284.293387] ? __ia32_sys_link+0x80/0x80 [ 2284.294313] ? __virt_addr_valid+0x170/0x5d0 [ 2284.295318] ? __check_object_size+0x319/0x440 [ 2284.296367] ? getname_flags.part.0+0x1dd/0x4f0 [ 2284.297429] __x64_sys_rename+0x7d/0xa0 [ 2284.298330] do_syscall_64+0x33/0x40 [ 2284.299186] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2284.300350] RIP: 0033:0x7f27391eeb19 [ 2284.301196] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2284.305419] RSP: 002b:00007f2736764188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2284.307152] RAX: ffffffffffffffda RBX: 00007f2739301f60 RCX: 00007f27391eeb19 [ 2284.308772] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000020000380 [ 2284.310391] RBP: 00007f27367641d0 R08: 0000000000000000 R09: 0000000000000000 [ 2284.312037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2284.313673] R13: 00007ffdf1fda73f R14: 00007f2736764300 R15: 0000000000022000 [ 2284.323524] FAULT_INJECTION: forcing a failure. [ 2284.323524] name failslab, interval 1, probability 0, space 0, times 0 [ 2284.324334] 9pnet: Insufficient options for proto=fd [ 2284.325033] CPU: 1 PID: 12369 Comm: syz-executor.6 Not tainted 5.10.236 #1 [ 2284.326961] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2284.328000] Call Trace: [ 2284.328331] dump_stack+0x107/0x167 [ 2284.328783] should_fail.cold+0x5/0xa [ 2284.329256] ? create_object.isra.0+0x3a/0xa20 [ 2284.329817] should_failslab+0x5/0x20 [ 2284.330287] kmem_cache_alloc+0x5b/0x310 [ 2284.330791] create_object.isra.0+0x3a/0xa20 [ 2284.331330] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2284.331966] kmem_cache_alloc+0x159/0x310 [ 2284.332479] ? jbd2_journal_put_journal_head+0x38a/0x560 [ 2284.333149] insert_revoke_hash+0x28/0x270 [ 2284.333673] jbd2_journal_revoke+0x2bb/0x570 [ 2284.334221] __ext4_forget+0x218/0x3e0 [ 2284.334696] ext4_free_blocks+0x194b/0x21f0 [ 2284.335244] ? ext4_mb_new_blocks+0x45c0/0x45c0 [ 2284.335827] ? ext4_ext_get_access.constprop.0.isra.0+0x80/0x80 [ 2284.336559] ? __ext4_journal_ensure_credits+0x263/0x2e0 [ 2284.337228] ext4_ext_remove_space+0x1ef7/0x3d90 [ 2284.337835] ? ext4_ext_index_trans_blocks+0x170/0x170 [ 2284.338486] ? ext4_es_lookup_extent+0xaa0/0xaa0 [ 2284.339079] ? down_write+0xe0/0x160 [ 2284.339532] ? down_write_killable+0x180/0x180 [ 2284.340094] ext4_ext_truncate+0x1ea/0x250 [ 2284.340617] ext4_truncate+0xc38/0x1160 [ 2284.341112] ? ext4_punch_hole+0x1070/0x1070 [ 2284.341657] ? __ext4_journal_start_sb+0x214/0x390 [ 2284.342255] ? __ext4_journal_start_sb+0x1db/0x390 [ 2284.342863] ext4_evict_inode+0xae0/0x1a60 [ 2284.343389] ? ext4_da_write_begin+0xd40/0xd40 [ 2284.343947] ? rwlock_bug.part.0+0x90/0x90 [ 2284.344470] ? ext4_da_write_begin+0xd40/0xd40 [ 2284.345034] evict+0x32b/0x8c0 [ 2284.345431] ? new_inode+0x250/0x250 [ 2284.345886] ? lock_downgrade+0x6d0/0x6d0 [ 2284.346400] ? rwlock_bug.part.0+0x90/0x90 [ 2284.346924] ? fsnotify_grab_connector+0x11a/0x250 [ 2284.347533] iput.part.0+0x4b9/0x6d0 [ 2284.347990] ? trace_event_raw_event_ext4_es_lookup_extent_enter+0x300/0x300 [ 2284.348857] iput+0x58/0x70 [ 2284.349226] dentry_unlink_inode+0x2bb/0x470 [ 2284.349763] __dentry_kill+0x36f/0x5c0 [ 2284.350244] ? dput+0x35/0xcd0 [ 2284.350637] dput+0x6f4/0xcd0 [ 2284.351024] do_renameat2+0x715/0xbf0 [ 2284.351481] ? __ia32_sys_link+0x80/0x80 [ 2284.351990] ? __virt_addr_valid+0x170/0x5d0 [ 2284.352534] ? __check_object_size+0x319/0x440 [ 2284.353100] __x64_sys_rename+0x7d/0xa0 [ 2284.353594] do_syscall_64+0x33/0x40 [ 2284.354042] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2284.354683] RIP: 0033:0x7f864dba0b19 [ 2284.355154] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2284.357454] RSP: 002b:00007f864b116188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2284.358411] RAX: ffffffffffffffda RBX: 00007f864dcb3f60 RCX: 00007f864dba0b19 [ 2284.359298] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2284.360176] RBP: 00007f864b1161d0 R08: 0000000000000000 R09: 0000000000000000 [ 2284.361049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2284.361918] R13: 00007ffeabe65e1f R14: 00007f864b116300 R15: 0000000000022000 [ 2284.364139] 9pnet: Insufficient options for proto=fd 02:22:17 executing program 4: move_mount(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x9) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000040)={'virt_wifi0\x00'}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) timerfd_gettime(r0, 0x0) [ 2284.379419] 9pnet: Insufficient options for proto=fd 02:22:17 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') (fail_nth: 9) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) 02:22:17 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:22:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) timerfd_gettime(r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file1\x00'}) timerfd_gettime(r1, &(0x7f0000000080)) [ 2284.433693] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 02:22:17 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r4 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2284.482340] FAULT_INJECTION: forcing a failure. [ 2284.482340] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2284.485215] CPU: 0 PID: 12402 Comm: syz-executor.3 Not tainted 5.10.236 #1 [ 2284.486901] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2284.488735] Call Trace: [ 2284.489310] dump_stack+0x107/0x167 [ 2284.490099] should_fail.cold+0x5/0xa [ 2284.490933] _copy_to_user+0x2e/0x180 [ 2284.491768] simple_read_from_buffer+0xcc/0x160 [ 2284.492188] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2284.492796] proc_fail_nth_read+0x198/0x230 [ 2284.494773] ? proc_sessionid_read+0x230/0x230 [ 2284.495764] ? security_file_permission+0xb1/0xe0 [ 2284.496818] ? proc_sessionid_read+0x230/0x230 [ 2284.497818] vfs_read+0x228/0x620 [ 2284.498580] ksys_read+0x12d/0x260 [ 2284.499361] ? vfs_write+0xb10/0xb10 [ 2284.500186] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2284.501343] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2284.502469] do_syscall_64+0x33/0x40 [ 2284.503285] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2284.504392] RIP: 0033:0x7f27391a169c [ 2284.505191] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2284.509082] RSP: 002b:00007f2736743170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2284.510745] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f27391a169c [ 2284.512288] RDX: 000000000000000f RSI: 00007f27367431e0 RDI: 0000000000000004 [ 2284.513834] RBP: 00007f27367431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2284.515380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2284.516918] R13: 00007ffdf1fda73f R14: 00007f2736743300 R15: 0000000000022000 [ 2284.533838] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2284.536080] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2284.546711] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:22:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) openat(r1, &(0x7f0000000040)='./file1\x00', 0x242781, 0x100) timerfd_gettime(r0, 0x0) 02:22:17 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 9) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:22:17 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2284.585449] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2284.596881] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2284.598469] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2284.600310] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:22:17 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 13) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c5", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 02:22:17 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b01", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2284.653849] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2284.654790] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2284.655722] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2284.656409] FAULT_INJECTION: forcing a failure. 02:22:17 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x0, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2284.656409] name failslab, interval 1, probability 0, space 0, times 0 [ 2284.659384] CPU: 0 PID: 12414 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 2284.660816] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2284.662516] Call Trace: [ 2284.663084] dump_stack+0x107/0x167 [ 2284.663843] should_fail.cold+0x5/0xa [ 2284.664641] ? jbd2__journal_start+0x190/0x7e0 [ 2284.665589] should_failslab+0x5/0x20 [ 2284.666381] kmem_cache_alloc+0x5b/0x310 [ 2284.667241] jbd2__journal_start+0x190/0x7e0 [ 2284.668170] __ext4_journal_start_sb+0x214/0x390 [ 2284.669168] ext4_evict_inode+0x8f4/0x1a60 [ 2284.670060] ? ext4_da_write_begin+0xd40/0xd40 [ 2284.671009] ? rwlock_bug.part.0+0x90/0x90 [ 2284.671895] ? ext4_da_write_begin+0xd40/0xd40 [ 2284.672839] evict+0x32b/0x8c0 [ 2284.673508] ? new_inode+0x250/0x250 [ 2284.674279] ? lock_downgrade+0x6d0/0x6d0 [ 2284.675147] ? rwlock_bug.part.0+0x90/0x90 [ 2284.676020] ? fsnotify_grab_connector+0x11a/0x250 [ 2284.677047] iput.part.0+0x4b9/0x6d0 [ 2284.677815] ? trace_event_raw_event_ext4_es_lookup_extent_enter+0x300/0x300 [ 2284.679314] iput+0x58/0x70 [ 2284.680057] dentry_unlink_inode+0x2bb/0x470 [ 2284.680982] __dentry_kill+0x36f/0x5c0 [ 2284.681980] ? dput+0x35/0xcd0 [ 2284.682652] dput+0x6f4/0xcd0 [ 2284.683484] do_renameat2+0x715/0xbf0 [ 2284.684287] ? __ia32_sys_link+0x80/0x80 02:22:17 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, 0x0, 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2284.685332] ? __virt_addr_valid+0x170/0x5d0 [ 2284.686350] ? __check_object_size+0x319/0x440 [ 2284.687598] __x64_sys_rename+0x7d/0xa0 [ 2284.688628] do_syscall_64+0x33/0x40 [ 2284.689583] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2284.690913] RIP: 0033:0x7ff904be4b19 [ 2284.691861] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2284.696562] RSP: 002b:00007ff90215a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2284.698502] RAX: ffffffffffffffda RBX: 00007ff904cf7f60 RCX: 00007ff904be4b19 [ 2284.700346] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2284.702169] RBP: 00007ff90215a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2284.704010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2284.705839] R13: 00007ffff65566bf R14: 00007ff90215a300 R15: 0000000000022000 [ 2284.707911] EXT4-fs error (device sda) in ext4_evict_inode:257: Out of memory [ 2284.731610] 9pnet: Insufficient options for proto=fd [ 2284.739439] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2284.743766] FAULT_INJECTION: forcing a failure. [ 2284.743766] name failslab, interval 1, probability 0, space 0, times 0 [ 2284.747287] CPU: 0 PID: 12423 Comm: syz-executor.6 Not tainted 5.10.236 #1 [ 2284.749093] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2284.751206] Call Trace: [ 2284.751873] dump_stack+0x107/0x167 [ 2284.752810] should_fail.cold+0x5/0xa [ 2284.753791] ? create_object.isra.0+0x3a/0xa20 [ 2284.754977] should_failslab+0x5/0x20 [ 2284.755936] kmem_cache_alloc+0x5b/0x310 [ 2284.756957] ? pagecache_get_page+0x243/0xc80 [ 2284.758104] create_object.isra.0+0x3a/0xa20 [ 2284.759238] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2284.760553] kmem_cache_alloc+0x159/0x310 [ 2284.761625] ext4_free_blocks+0x10ef/0x21f0 [ 2284.762585] ? ext4_mb_new_blocks+0x45c0/0x45c0 [ 2284.763773] ? __ext4_journal_ensure_credits+0x263/0x2e0 [ 2284.765172] ext4_ext_remove_space+0x1ef7/0x3d90 [ 2284.766409] ? ext4_ext_index_trans_blocks+0x170/0x170 [ 2284.767778] ? ext4_es_lookup_extent+0xaa0/0xaa0 [ 2284.768965] ? down_write+0xe0/0x160 [ 2284.769908] ? down_write_killable+0x180/0x180 [ 2284.771092] ext4_ext_truncate+0x1ea/0x250 [ 2284.772173] ext4_truncate+0xc38/0x1160 [ 2284.773190] ? ext4_punch_hole+0x1070/0x1070 [ 2284.774322] ? __ext4_journal_start_sb+0x214/0x390 [ 2284.775560] ? __ext4_journal_start_sb+0x1db/0x390 [ 2284.776824] ext4_evict_inode+0xae0/0x1a60 [ 2284.777918] ? ext4_da_write_begin+0xd40/0xd40 [ 2284.779097] ? rwlock_bug.part.0+0x90/0x90 [ 2284.780188] ? ext4_da_write_begin+0xd40/0xd40 [ 2284.781349] evict+0x32b/0x8c0 [ 2284.782165] ? new_inode+0x250/0x250 [ 2284.783134] ? lock_downgrade+0x6d0/0x6d0 [ 2284.784187] ? rwlock_bug.part.0+0x90/0x90 [ 2284.785270] ? fsnotify_grab_connector+0x11a/0x250 [ 2284.786534] iput.part.0+0x4b9/0x6d0 [ 2284.787499] ? trace_event_raw_event_ext4_es_lookup_extent_enter+0x300/0x300 [ 2284.789284] iput+0x58/0x70 [ 2284.790050] dentry_unlink_inode+0x2bb/0x470 [ 2284.791170] __dentry_kill+0x36f/0x5c0 [ 2284.792187] ? dput+0x35/0xcd0 [ 2284.793007] dput+0x6f4/0xcd0 [ 2284.793812] do_renameat2+0x715/0xbf0 [ 2284.794826] ? __ia32_sys_link+0x80/0x80 [ 2284.795873] ? __virt_addr_valid+0x170/0x5d0 [ 2284.797006] ? __check_object_size+0x319/0x440 [ 2284.798205] __x64_sys_rename+0x7d/0xa0 [ 2284.799217] do_syscall_64+0x33/0x40 [ 2284.800166] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2284.801486] RIP: 0033:0x7f864dba0b19 [ 2284.802457] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2284.807139] RSP: 002b:00007f864b116188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2284.809090] RAX: ffffffffffffffda RBX: 00007f864dcb3f60 RCX: 00007f864dba0b19 [ 2284.810975] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2284.812735] RBP: 00007f864b1161d0 R08: 0000000000000000 R09: 0000000000000000 [ 2284.814488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2284.816218] R13: 00007ffeabe65e1f R14: 00007f864b116300 R15: 0000000000022000 [ 2284.834759] 9pnet: Insufficient options for proto=fd [ 2284.836498] 9pnet: Insufficient options for proto=fd [ 2284.879322] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2284.880419] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2284.881461] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2297.663962] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 02:22:30 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) 02:22:30 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:22:30 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, 0x0, 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:22:30 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 14) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c5", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 02:22:30 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b01", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:22:30 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:22:30 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x0, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:22:30 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) timerfd_gettime(r0, 0x0) [ 2297.675394] FAULT_INJECTION: forcing a failure. [ 2297.675394] name failslab, interval 1, probability 0, space 0, times 0 [ 2297.677063] CPU: 1 PID: 12443 Comm: syz-executor.6 Not tainted 5.10.236 #1 [ 2297.678071] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2297.679088] Call Trace: [ 2297.679483] dump_stack+0x107/0x167 [ 2297.680016] should_fail.cold+0x5/0xa [ 2297.680575] ? create_object.isra.0+0x3a/0xa20 [ 2297.681243] should_failslab+0x5/0x20 [ 2297.681801] kmem_cache_alloc+0x5b/0x310 [ 2297.682384] ? pagecache_get_page+0x243/0xc80 [ 2297.683046] create_object.isra.0+0x3a/0xa20 [ 2297.683691] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2297.684430] kmem_cache_alloc+0x159/0x310 [ 2297.685041] ext4_free_blocks+0x10ef/0x21f0 [ 2297.685677] ? ext4_mb_new_blocks+0x45c0/0x45c0 [ 2297.686353] ? __ext4_journal_ensure_credits+0x263/0x2e0 [ 2297.687143] ext4_ext_remove_space+0x1ef7/0x3d90 [ 2297.687858] ? ext4_ext_index_trans_blocks+0x170/0x170 [ 2297.688619] ? ext4_es_lookup_extent+0xaa0/0xaa0 [ 2297.689298] ? down_write+0xe0/0x160 [ 2297.689842] ? down_write_killable+0x180/0x180 [ 2297.690498] ext4_ext_truncate+0x1ea/0x250 [ 2297.691110] ext4_truncate+0xc38/0x1160 [ 2297.691691] ? ext4_punch_hole+0x1070/0x1070 [ 2297.692324] ? __ext4_journal_start_sb+0x214/0x390 [ 2297.693031] ? __ext4_journal_start_sb+0x1db/0x390 [ 2297.693745] ext4_evict_inode+0xae0/0x1a60 [ 2297.694347] ? ext4_da_write_begin+0xd40/0xd40 [ 2297.695006] ? rwlock_bug.part.0+0x90/0x90 [ 2297.695628] ? ext4_da_write_begin+0xd40/0xd40 [ 2297.696294] evict+0x32b/0x8c0 [ 2297.696766] ? new_inode+0x250/0x250 [ 2297.697302] ? lock_downgrade+0x6d0/0x6d0 [ 2297.697893] ? rwlock_bug.part.0+0x90/0x90 [ 2297.698503] ? fsnotify_grab_connector+0x11a/0x250 [ 2297.699235] iput.part.0+0x4b9/0x6d0 [ 2297.699770] ? trace_event_raw_event_ext4_es_lookup_extent_enter+0x300/0x300 [ 2297.700792] iput+0x58/0x70 [ 2297.701225] dentry_unlink_inode+0x2bb/0x470 [ 2297.701875] __dentry_kill+0x36f/0x5c0 [ 2297.702439] ? dput+0x35/0xcd0 [ 2297.702901] dput+0x6f4/0xcd0 [ 2297.703362] do_renameat2+0x715/0xbf0 [ 2297.703916] ? __ia32_sys_link+0x80/0x80 [ 2297.704505] ? __virt_addr_valid+0x170/0x5d0 [ 2297.705123] ? __check_object_size+0x319/0x440 [ 2297.705797] __x64_sys_rename+0x7d/0xa0 [ 2297.706363] do_syscall_64+0x33/0x40 [ 2297.706897] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2297.708290] RIP: 0033:0x7f864dba0b19 [ 2297.709248] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2297.713688] RSP: 002b:00007f864b116188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2297.715439] RAX: ffffffffffffffda RBX: 00007f864dcb3f60 RCX: 00007f864dba0b19 [ 2297.717073] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2297.718707] RBP: 00007f864b1161d0 R08: 0000000000000000 R09: 0000000000000000 [ 2297.720418] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2297.722055] R13: 00007ffeabe65e1f R14: 00007f864b116300 R15: 0000000000022000 [ 2297.742804] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 02:22:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) timerfd_gettime(r0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup3(r0, r1, 0x80000) r2 = syz_io_uring_setup(0x68d4, &(0x7f0000000100), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f0000000000)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, 0x0, 0x0) dup2(r2, r1) recvmsg$unix(r0, &(0x7f0000000240)={&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000300)=""/186, 0xba}, {&(0x7f0000000280)=""/96, 0x60}], 0x2}, 0x20) [ 2297.782767] 9pnet: Insufficient options for proto=fd [ 2297.793574] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2297.795224] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2297.796848] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2297.804903] FAULT_INJECTION: forcing a failure. [ 2297.804903] name failslab, interval 1, probability 0, space 0, times 0 [ 2297.805618] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2297.807563] CPU: 0 PID: 12446 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 2297.808851] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2297.810252] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2297.810259] Call Trace: [ 2297.810282] dump_stack+0x107/0x167 [ 2297.810307] should_fail.cold+0x5/0xa [ 2297.810329] ? create_object.isra.0+0x3a/0xa20 [ 2297.816456] should_failslab+0x5/0x20 [ 2297.817262] kmem_cache_alloc+0x5b/0x310 [ 2297.818122] create_object.isra.0+0x3a/0xa20 [ 2297.818777] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2297.819053] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2297.819078] kmem_cache_alloc+0x159/0x310 [ 2297.819104] jbd2__journal_start+0x190/0x7e0 [ 2297.819128] __ext4_journal_start_sb+0x214/0x390 [ 2297.824278] ext4_evict_inode+0x8f4/0x1a60 [ 2297.825180] ? ext4_da_write_begin+0xd40/0xd40 [ 2297.826141] ? rwlock_bug.part.0+0x90/0x90 [ 2297.827040] ? ext4_da_write_begin+0xd40/0xd40 [ 2297.827999] evict+0x32b/0x8c0 [ 2297.828674] ? new_inode+0x250/0x250 [ 2297.829457] ? lock_downgrade+0x6d0/0x6d0 [ 2297.830332] ? rwlock_bug.part.0+0x90/0x90 [ 2297.831228] ? fsnotify_grab_connector+0x11a/0x250 [ 2297.832272] iput.part.0+0x4b9/0x6d0 [ 2297.833063] ? trace_event_raw_event_ext4_es_lookup_extent_enter+0x300/0x300 [ 2297.834562] iput+0x58/0x70 [ 2297.835199] dentry_unlink_inode+0x2bb/0x470 [ 2297.836128] __dentry_kill+0x36f/0x5c0 [ 2297.836957] ? dput+0x35/0xcd0 [ 2297.837635] dput+0x6f4/0xcd0 [ 2297.838303] do_renameat2+0x715/0xbf0 [ 2297.839123] ? __ia32_sys_link+0x80/0x80 [ 2297.839989] ? __virt_addr_valid+0x170/0x5d0 [ 2297.840917] ? __check_object_size+0x319/0x440 [ 2297.841915] __x64_sys_rename+0x7d/0xa0 [ 2297.842749] do_syscall_64+0x33/0x40 [ 2297.843544] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2297.844646] RIP: 0033:0x7ff904be4b19 [ 2297.845432] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2297.849314] RSP: 002b:00007ff90215a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2297.850932] RAX: ffffffffffffffda RBX: 00007ff904cf7f60 RCX: 00007ff904be4b19 [ 2297.852434] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2297.853932] RBP: 00007ff90215a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2297.855448] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2297.856949] R13: 00007ffff65566bf R14: 00007ff90215a300 R15: 0000000000022000 [ 2297.861716] 9pnet: Insufficient options for proto=fd 02:22:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) timerfd_gettime(r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xff}}, './file1\x00'}) timerfd_gettime(r0, &(0x7f0000000040)) [ 2297.900829] 9pnet: Insufficient options for proto=fd 02:22:30 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x0, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:22:30 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:22:30 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, 0x0, 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2297.983407] 9pnet: Insufficient options for proto=fd 02:22:30 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) unlinkat(r0, &(0x7f0000000080)='./file2\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) 02:22:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) timerfd_gettime(r0, 0x0) r1 = syz_io_uring_setup(0x68d4, &(0x7f0000000100), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000000)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) timer_create(0x6, &(0x7f0000000180)={0x0, 0x7, 0x1, @thr={&(0x7f0000000040)="53140821982b1445edc21ec360a63df4966d", &(0x7f0000000080)="fbd0e4a6a3cf58ced2fd294552c7ab975bf159494f48e416cf4d4bc7089fb8d98da10a25c9e459a5ce3dc459692b9430baf62817aa3508f1e112d509830cc53db4663b83e7a01287d74eaad7442dad8963d1872545f1c207f4bfaa966d0d4f0e3a54e96a637d0931ed364897d5c1b8c9e0af827ccc3a20e62305bdfd5656b6e8e279412cf0a4b286565b7c21c249b4b8eb9a591a9b83740fa60dff2872340b0b0ef72a9b863d7497b502a2b365dc7a41363ede0998ef066f3cafbaee4b6aac6d96b2897f05685858697c3c257abba024da6b3fd907cebc99a205898194a2113035005fea45d0cfeafb6b881c308bf5131973e69c0a0e75"}}, &(0x7f00000001c0)=0x0) timer_settime(r2, 0x0, &(0x7f0000000200)={{0x77359400}}, &(0x7f0000000240)) [ 2298.009868] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2298.038224] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 02:22:30 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x0, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:22:30 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 15) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c5", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 02:22:30 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chdir(&(0x7f0000000000)='mnt/encrypted_dir\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14, 0x1000) [ 2298.112464] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2298.114096] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2298.115766] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2298.148703] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2298.150437] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2298.152159] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2298.208719] 9pnet: Insufficient options for proto=fd [ 2298.217275] FAULT_INJECTION: forcing a failure. [ 2298.217275] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2298.220213] CPU: 0 PID: 12486 Comm: syz-executor.6 Not tainted 5.10.236 #1 [ 2298.221724] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2298.223532] Call Trace: [ 2298.224108] dump_stack+0x107/0x167 [ 2298.224900] should_fail.cold+0x5/0xa [ 2298.225735] _copy_from_user+0x2e/0x1b0 [ 2298.226606] kstrtouint_from_user+0xbd/0x220 [ 2298.227571] ? kstrtou8_from_user+0x210/0x210 [ 2298.228552] ? lock_acquire+0x197/0x470 [ 2298.229412] ? ksys_write+0x12d/0x260 [ 2298.230254] proc_fail_nth_write+0x78/0x220 [ 2298.231192] ? proc_task_getattr+0x1f0/0x1f0 [ 2298.232155] ? proc_task_getattr+0x1f0/0x1f0 [ 2298.233101] vfs_write+0x29a/0xb10 [ 2298.233882] ksys_write+0x12d/0x260 [ 2298.234678] ? __ia32_sys_read+0xb0/0xb0 [ 2298.235565] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2298.236717] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2298.237847] do_syscall_64+0x33/0x40 [ 2298.238654] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2298.239764] RIP: 0033:0x7f864db535ff [ 2298.240575] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 2298.244609] RSP: 002b:00007f864b116170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 2298.246270] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f864db535ff [ 2298.247836] RDX: 0000000000000001 RSI: 00007f864b1161e0 RDI: 0000000000000004 [ 2298.249407] RBP: 00007f864b1161d0 R08: 0000000000000000 R09: 0000000000000000 [ 2298.250956] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2298.252503] R13: 00007ffeabe65e1f R14: 00007f864b116300 R15: 0000000000022000 [ 2311.739322] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 02:22:44 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c5", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 02:22:44 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 11) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:22:44 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x0, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:22:44 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:22:44 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:22:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) timerfd_gettime(r0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f00000000c0)=@routing={0x1d, 0x4, 0x0, 0x6, 0x0, [@dev={0xfe, 0x80, '\x00', 0x23}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01']}, 0x28) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'veth0_to_bridge\x00'}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000040)={0x1000, 0x400, 0xb73, 0x2, 0x1}) 02:22:44 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x0, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:22:44 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='mnt/encrypted_dir\x00') rename(&(0x7f0000000380)='./file2\x00', &(0x7f0000000200)='mnt/encrypted_dir\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) r0 = syz_io_uring_setup(0x2cb5, &(0x7f0000000280)={0x0, 0x984d, 0x0, 0x2, 0x28d}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000080)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000140)=@IORING_OP_ASYNC_CANCEL={0xe, 0x3, 0x0, 0x0, 0x0, 0x12345}, 0x7) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000340)=ANY=[@ANYBLOB="011a0000a3c84e94c584d18c87e379b9d2325b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00ile0\x00']) syncfs(r0) r4 = syz_io_uring_setup(0x68d4, &(0x7f0000000100), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r4, 0x0, &(0x7f0000000000)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_BUFFERS(r4, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r4, 0xc0c89425, &(0x7f00000003c0)={"1255909385095b36aeb141705bd2251a", 0x0, 0x0, {0x7, 0x9c79b2f1}, {0x20, 0x6}, 0x81, [0x81, 0xfffffffffffffffa, 0x3aeb, 0x3f, 0x3, 0xffffffff, 0x2, 0xffff, 0x6, 0x2, 0x7fffffff, 0x0, 0x7fff, 0x101, 0x100000000, 0x18]}) openat(r2, &(0x7f0000000300)='./mnt\x00', 0x42200, 0x8) [ 2311.778805] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2311.787857] FAULT_INJECTION: forcing a failure. [ 2311.787857] name failslab, interval 1, probability 0, space 0, times 0 [ 2311.790406] CPU: 0 PID: 12507 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 2311.791815] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2311.793523] Call Trace: [ 2311.794071] dump_stack+0x107/0x167 [ 2311.794815] should_fail.cold+0x5/0xa [ 2311.795609] ? create_object.isra.0+0x3a/0xa20 [ 2311.796548] should_failslab+0x5/0x20 [ 2311.797324] kmem_cache_alloc+0x5b/0x310 [ 2311.798156] ? __kasan_slab_free+0x122/0x160 [ 2311.799063] create_object.isra.0+0x3a/0xa20 [ 2311.799960] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2311.800990] __kmalloc+0x16e/0x390 [ 2311.801711] ? __ext4_journal_start_sb+0x1db/0x390 [ 2311.802703] ext4_ext_remove_space+0x15af/0x3d90 [ 2311.803687] ? ext4_es_remove_extent+0x2f2/0x450 [ 2311.804654] ? do_raw_read_unlock+0x70/0x70 [ 2311.805535] ? ext4_da_release_space+0x21/0x480 [ 2311.806471] ? ext4_ext_index_trans_blocks+0x170/0x170 [ 2311.807549] ? ext4_es_lookup_extent+0xaa0/0xaa0 [ 2311.808496] ? down_write+0xe0/0x160 [ 2311.809241] ? down_write_killable+0x180/0x180 [ 2311.810163] ext4_ext_truncate+0x1ea/0x250 [ 2311.811025] ext4_truncate+0xc38/0x1160 [ 2311.811834] ? ext4_punch_hole+0x1070/0x1070 [ 2311.812712] ? __ext4_journal_start_sb+0x214/0x390 [ 2311.813692] ? __ext4_journal_start_sb+0x1db/0x390 [ 2311.814684] ext4_evict_inode+0xae0/0x1a60 [ 2311.815559] ? ext4_da_write_begin+0xd40/0xd40 [ 2311.816468] ? rwlock_bug.part.0+0x90/0x90 [ 2311.817323] ? ext4_da_write_begin+0xd40/0xd40 [ 2311.818242] evict+0x32b/0x8c0 [ 2311.818905] ? new_inode+0x250/0x250 [ 2311.819659] ? lock_downgrade+0x6d0/0x6d0 [ 2311.820501] ? rwlock_bug.part.0+0x90/0x90 [ 2311.821351] ? fsnotify_grab_connector+0x11a/0x250 [ 2311.822349] iput.part.0+0x4b9/0x6d0 [ 2311.823115] ? trace_event_raw_event_ext4_es_lookup_extent_enter+0x300/0x300 [ 2311.824551] iput+0x58/0x70 [ 2311.825161] dentry_unlink_inode+0x2bb/0x470 [ 2311.826045] __dentry_kill+0x36f/0x5c0 [ 2311.826826] ? dput+0x35/0xcd0 [ 2311.827471] dput+0x6f4/0xcd0 [ 2311.828106] do_renameat2+0x715/0xbf0 [ 2311.828878] ? __ia32_sys_link+0x80/0x80 [ 2311.829691] ? __virt_addr_valid+0x170/0x5d0 [ 2311.830566] ? __check_object_size+0x319/0x440 [ 2311.831529] __x64_sys_rename+0x7d/0xa0 [ 2311.832334] do_syscall_64+0x33/0x40 [ 2311.833076] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2311.834100] RIP: 0033:0x7ff904be4b19 [ 2311.834847] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2311.838484] RSP: 002b:00007ff90215a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2311.839175] 9pnet: Insufficient options for proto=fd [ 2311.840005] RAX: ffffffffffffffda RBX: 00007ff904cf7f60 RCX: 00007ff904be4b19 [ 2311.840016] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2311.840037] RBP: 00007ff90215a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2311.845506] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2311.846930] R13: 00007ffff65566bf R14: 00007ff90215a300 R15: 0000000000022000 [ 2311.886721] 9pnet: Insufficient options for proto=fd [ 2311.893722] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2311.895439] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2311.897068] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2311.898715] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2311.900944] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2311.904045] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2311.913709] 9pnet: Insufficient options for proto=fd 02:22:44 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') mknod(&(0x7f0000000000)='./file1\x00', 0x800, 0x4d) getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=@random={'os2.', '\x00'}, &(0x7f0000000280)=""/150, 0x96) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) 02:22:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) stat(&(0x7f00000001c0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) r2 = msgget$private(0x0, 0x0) getresgid(&(0x7f00000010c0), &(0x7f0000001100)=0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2, 0xee01, 0x0, 0x0, r3, 0x0, 0x3}, 0x0, 0x0, 0x7, 0x5, 0x7f, 0x0, 0xff, 0x8001, 0x0, 0x3, 0x0, 0xffffffffffffffff}) fchownat(r0, &(0x7f0000000040)='./file1\x00', r1, r3, 0x1000) timerfd_gettime(r0, 0x0) 02:22:44 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x0, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:22:44 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 12) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:22:44 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:22:44 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x0, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2312.054292] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2312.119392] 9pnet: Insufficient options for proto=fd [ 2312.123951] FAULT_INJECTION: forcing a failure. [ 2312.123951] name failslab, interval 1, probability 0, space 0, times 0 [ 2312.126675] CPU: 1 PID: 12534 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 2312.128129] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2312.128280] 9pnet: Insufficient options for proto=fd [ 2312.129868] Call Trace: [ 2312.129899] dump_stack+0x107/0x167 [ 2312.129928] should_fail.cold+0x5/0xa [ 2312.132849] ? create_object.isra.0+0x3a/0xa20 [ 2312.133815] should_failslab+0x5/0x20 [ 2312.134615] kmem_cache_alloc+0x5b/0x310 [ 2312.135492] create_object.isra.0+0x3a/0xa20 [ 2312.136406] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2312.137479] kmem_cache_alloc+0x159/0x310 [ 2312.138349] ? jbd2_journal_put_journal_head+0x38a/0x560 [ 2312.139723] insert_revoke_hash+0x28/0x270 [ 2312.140996] jbd2_journal_revoke+0x2bb/0x570 [ 2312.142109] __ext4_forget+0x218/0x3e0 [ 2312.143100] ext4_free_blocks+0x194b/0x21f0 [ 2312.144201] ? ext4_mb_new_blocks+0x45c0/0x45c0 [ 2312.145381] ? ext4_ext_get_access.constprop.0.isra.0+0x80/0x80 [ 2312.146873] ? __ext4_journal_ensure_credits+0x263/0x2e0 [ 2312.148260] ext4_ext_remove_space+0x1ef7/0x3d90 [ 2312.149496] ? ext4_ext_index_trans_blocks+0x170/0x170 [ 2312.150825] ? ext4_es_lookup_extent+0xaa0/0xaa0 [ 2312.152017] ? down_write+0xe0/0x160 [ 2312.152953] ? down_write_killable+0x180/0x180 [ 2312.154101] ext4_ext_truncate+0x1ea/0x250 [ 2312.155173] ext4_truncate+0xc38/0x1160 [ 2312.156343] ? ext4_punch_hole+0x1070/0x1070 [ 2312.157430] ? __ext4_journal_start_sb+0x214/0x390 [ 2312.158635] ? __ext4_journal_start_sb+0x1db/0x390 [ 2312.159871] ext4_evict_inode+0xae0/0x1a60 [ 2312.160924] ? ext4_da_write_begin+0xd40/0xd40 [ 2312.162057] ? rwlock_bug.part.0+0x90/0x90 [ 2312.163116] ? ext4_da_write_begin+0xd40/0xd40 [ 2312.164240] evict+0x32b/0x8c0 [ 2312.165042] ? new_inode+0x250/0x250 [ 2312.165958] ? lock_downgrade+0x6d0/0x6d0 [ 2312.166973] ? rwlock_bug.part.0+0x90/0x90 [ 2312.168031] ? fsnotify_grab_connector+0x11a/0x250 [ 2312.169256] iput.part.0+0x4b9/0x6d0 [ 2312.170172] ? trace_event_raw_event_ext4_es_lookup_extent_enter+0x300/0x300 [ 2312.171892] iput+0x58/0x70 [ 2312.172618] dentry_unlink_inode+0x2bb/0x470 [ 2312.173698] __dentry_kill+0x36f/0x5c0 [ 2312.174645] ? dput+0x35/0xcd0 [ 2312.175460] dput+0x6f4/0xcd0 [ 2312.176240] do_renameat2+0x715/0xbf0 [ 2312.177199] ? __ia32_sys_link+0x80/0x80 [ 2312.178197] ? __virt_addr_valid+0x170/0x5d0 [ 2312.179270] ? __check_object_size+0x319/0x440 [ 2312.180416] __x64_sys_rename+0x7d/0xa0 [ 2312.181374] do_syscall_64+0x33/0x40 [ 2312.182279] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2312.183529] RIP: 0033:0x7ff904be4b19 [ 2312.184442] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2312.188835] RSP: 002b:00007ff90215a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2312.190657] RAX: ffffffffffffffda RBX: 00007ff904cf7f60 RCX: 00007ff904be4b19 [ 2312.192367] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2312.194074] RBP: 00007ff90215a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2312.195788] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2312.197494] R13: 00007ffff65566bf R14: 00007ff90215a300 R15: 0000000000022000 [ 2312.215173] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2312.216360] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2312.217587] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2312.270509] 9pnet: Insufficient options for proto=fd 02:22:57 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 13) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:22:57 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:22:57 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x0, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:22:57 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:22:57 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c5", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) chroot(&(0x7f0000000040)='./file1\x00') [ 2324.988745] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 02:22:57 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x80, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x200}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./mnt\x00', 0x101400, 0x15) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') mount(&(0x7f0000000140)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000200)='mnt/encrypted_dir\x00', &(0x7f0000000280)='cramfs\x00', 0xa5069, &(0x7f00000002c0)='.\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) stat(&(0x7f00000001c0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./mnt\x00', 0x81f9, 0xa, &(0x7f0000001900)=[{&(0x7f0000000400)="73eaff78e095b4e86d40cbf9b97c093d6cd9dc3800ff3a70fd08d76edafa57614c215dd5e49ec9199c15d9f0242895cce3d66c84a47cd973a5f7ef72292a80af274bfb18f3f2ab26412e86bdef65d23e78fe2fc82760cc732b10a643082bba75adfce768a47da432357050859c717be5ce9aca3d92df71124dcdf70e4fd5ac955ae54ad81a2178fa7c10ad5f29539c2d1b43ad34073e7e481b9c2a83b7ae4c824241", 0xa2, 0x8}, {&(0x7f00000004c0)="06f70e62c229a10de85bb81f43e2c8ca72dc8933e1de80da04385075d3e3b8", 0x1f}, {&(0x7f0000000500)="8890ccfe253c66e88761921d08ee38fbd00bdafb56ed626351ab1b12deb513ef4da988f164499f85eae1ff23c389084531dc010152cdd69b5c1dc9ed2749c1777eb7ccf7e69e2b6c9bfc2909f9639edadc49d8322bc9e36fc95826773be7f1fda12e031bb823a88376c2516fc865d5156d519557c31384b3bb76e3372dcdcf87da4967", 0x83, 0xffffffff}, {&(0x7f00000005c0)="89b3d7421895a7a3f854e61d64f0c7c5860d01b4d15f3d8f9c03e8bb1f52d52ca90c704e62fd81921153c4339dba088c001e85fe65014a071adad60a1f9617cd63024418bf0fecdf903fbdd30aa3672c82167256772cd8caeba298d358d1ce8b485c05a6718191c04c68cceda97dff8e60caa7c424667830afa61e1f7e896496573897b5a82b7ed2f9c8c58ec9f58142", 0x90, 0x9}, {&(0x7f0000000680)="39f2630a67ba245bc2813319a6000a293bfb25db034f1040376f284fa1b25fad74b10392fc1254a0d23e70d5ea7b710b49bc907a47c9f1173ae7fc2a964acca28c209ad40211f0c2af8d8d38fd61ad60cfeac81e825083cf41b595d13bda0357de8095c1dfd661758428cf6d71fac548e07ea9c449d7ca63304a06bc15aff171e0a3f88f571a6cc8369f81646200f2bd12743acd0258352bc650d2a13c32396a06378d2c37d995aa7ab62a9e3426b1fc62fb0d86fd4b4d1cd4bdc9", 0xbb, 0x7}, {&(0x7f0000000740)="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", 0x1000, 0xc49}, {&(0x7f0000001740)="059a64fccd7c2cfbde48c3aa50e8968ec53aaf965bf4c2fc52390decfc42152ec30d801a8cfc23", 0x27, 0x7ff}, {&(0x7f0000001780)="db8a01b8bf49baa9a480732a8b4bfb0933188507ae35fd72b322427b5af9cd46a3d2e926f4fc0a68451b104603a887b1fcf06803490a08a36e7ed898686ff85bb18995b77051ae58fdebaea882c222d81f6c8dafd733a01b3229df077f0bbb72c8a75409be935ed540ac747fbc", 0x6d, 0x100000001}, {&(0x7f0000001800)="2ffc1165f22456c8c8f3ae6a76c81d90f77c95ffe410264a1919c364dbe53a11b871a822029f5d810eb6fc838898487569af5a74866cf2acbc841ba47c316bee7bbeb031d69141eb55a9e200ef6246db5bce7f72545378f03e0597cbc778f7ebbc6e6692e7fdbac0477b60", 0x6b, 0xd5d3}, {&(0x7f0000001880)="202cf756082a698abe2c63edb7a0f6427d0d974c851858dd9ef647d271805d9c20642b8bc6632772f6c773fbeb1b890edfb70f6e51f11e62e82fd4777bf399d3b787115489614927", 0x48, 0x8}], 0x58850, &(0x7f0000001b00)={[{@nr_inodes={'nr_inodes', 0x3d, [0x78, 0x34, 0x37, 0x7f, 0x74, 0x65, 0x78, 0x33, 0x36]}}, {@uid={'uid', 0x3d, r0}}, {@nr_blocks={'nr_blocks', 0x3d, [0x25, 0x2d, 0x6d]}}, {@mode={'mode', 0x3d, 0x102}}, {@huge_never}, {@mode={'mode', 0x3d, 0x9}}, {@huge_advise}, {@huge_within_size}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@hash}, {@dont_hash}, {@appraise_type}, {@subj_type={'subj_type', 0x3d, ']+'}}, {@smackfshat}]}) 02:22:57 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:22:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) mount$bind(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x8010, 0x0) timerfd_gettime(r0, 0x0) [ 2325.027296] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2325.042363] FAULT_INJECTION: forcing a failure. [ 2325.042363] name failslab, interval 1, probability 0, space 0, times 0 [ 2325.045354] CPU: 1 PID: 12552 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 2325.046936] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2325.048826] Call Trace: [ 2325.049442] dump_stack+0x107/0x167 [ 2325.050275] should_fail.cold+0x5/0xa [ 2325.051171] ? create_object.isra.0+0x3a/0xa20 [ 2325.052243] should_failslab+0x5/0x20 [ 2325.053201] kmem_cache_alloc+0x5b/0x310 [ 2325.054150] ? pagecache_get_page+0x243/0xc80 [ 2325.055213] create_object.isra.0+0x3a/0xa20 [ 2325.056235] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2325.057426] kmem_cache_alloc+0x159/0x310 [ 2325.058403] ext4_free_blocks+0x10ef/0x21f0 [ 2325.059453] ? ext4_mb_new_blocks+0x45c0/0x45c0 [ 2325.060559] ? __ext4_journal_ensure_credits+0x263/0x2e0 [ 2325.061837] ext4_ext_remove_space+0x1ef7/0x3d90 [ 2325.062985] ? ext4_ext_index_trans_blocks+0x170/0x170 [ 2325.064228] ? ext4_es_lookup_extent+0xaa0/0xaa0 [ 2325.065329] ? down_write+0xe0/0x160 [ 2325.066196] ? down_write_killable+0x180/0x180 [ 2325.067282] ext4_ext_truncate+0x1ea/0x250 [ 2325.068269] ext4_truncate+0xc38/0x1160 [ 2325.069203] ? ext4_punch_hole+0x1070/0x1070 [ 2325.070233] ? __ext4_journal_start_sb+0x214/0x390 [ 2325.071386] ? __ext4_journal_start_sb+0x1db/0x390 [ 2325.072534] ext4_evict_inode+0xae0/0x1a60 [ 2325.073530] ? ext4_da_write_begin+0xd40/0xd40 [ 2325.074592] ? rwlock_bug.part.0+0x90/0x90 [ 2325.075607] ? ext4_da_write_begin+0xd40/0xd40 [ 2325.076671] evict+0x32b/0x8c0 [ 2325.077431] ? new_inode+0x250/0x250 [ 2325.078304] ? lock_downgrade+0x6d0/0x6d0 [ 2325.079272] ? rwlock_bug.part.0+0x90/0x90 [ 2325.080263] ? fsnotify_grab_connector+0x11a/0x250 [ 2325.081416] iput.part.0+0x4b9/0x6d0 [ 2325.082283] ? trace_event_raw_event_ext4_es_lookup_extent_enter+0x300/0x300 [ 2325.083949] iput+0x58/0x70 [ 2325.084646] dentry_unlink_inode+0x2bb/0x470 [ 2325.085675] __dentry_kill+0x36f/0x5c0 [ 2325.086589] ? dput+0x35/0xcd0 [ 2325.087349] dput+0x6f4/0xcd0 [ 2325.088092] do_renameat2+0x715/0xbf0 [ 2325.088998] ? __ia32_sys_link+0x80/0x80 [ 2325.089956] ? __virt_addr_valid+0x170/0x5d0 [ 2325.090985] ? __check_object_size+0x319/0x440 [ 2325.092101] __x64_sys_rename+0x7d/0xa0 [ 2325.093028] do_syscall_64+0x33/0x40 [ 2325.093898] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2325.095087] RIP: 0033:0x7ff904be4b19 [ 2325.095966] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2325.100218] RSP: 002b:00007ff90215a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2325.101986] RAX: ffffffffffffffda RBX: 00007ff904cf7f60 RCX: 00007ff904be4b19 [ 2325.103656] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2325.105310] RBP: 00007ff90215a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2325.106963] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2325.108628] R13: 00007ffff65566bf R14: 00007ff90215a300 R15: 0000000000022000 02:22:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) timerfd_gettime(r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) faccessat2(r1, &(0x7f0000000040)='./file1\x00', 0x40, 0x500) [ 2325.129436] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2325.131167] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2325.134773] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2325.151407] 9pnet: Insufficient options for proto=fd [ 2325.153575] 9pnet: Insufficient options for proto=fd [ 2325.215836] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2325.217283] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2325.218838] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2325.269706] 9pnet: Insufficient options for proto=fd 02:23:12 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 14) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:23:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') mount(&(0x7f0000000000)=@md0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x180800, &(0x7f0000000200)='.$-$\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) 02:23:12 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x0) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:23:12 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:23:12 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:23:12 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000500)=ANY=[@ANYBLOB="011a0000a3c84e94c5", @ANYRES32=r1, @ANYBLOB="00000000000000002e2f66696c6530005efe88164818c1f0e1c08d8b1cd4898669857de2022052a2f7baa3cd30de1cd3bcf551780622abd5062f99560a12a082c147743519c5a5e10c14eceaa2f140700c59c5cfacae11f787e0eefa5a465cbcd1dd7ae1ceca5b083a1d4314e00c0ee0edafa1c601104186d5cfb9437ecb0ced3114e7b14bb6a4dbd9eca1"]) setxattr$incfs_metadata(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280), &(0x7f00000002c0)="1ae5d0305a2d344991f84efe8ec0181879d992fa0a096e76f0dce5021ca2d4ee68a6bf3921d28e4d66d2b0ca1052f881fc00e55b8b92c42508322a279452be829d569e04efb7d08dcb9f38fd1c021035ab3573b456cceb84c36bdb0ca04e0f4ae6310b11b4cc2a2cf4898ef14e4c118352ca14b54bbb2e0ef7d7eb418fae20610889074c9043378fb99ed03b21e14b50f691303388e9b723ddfb624ded062e40114992ed9d9bb6f70d8812d92bf67dd5e79eeaba544d2882ab2d46220671", 0xbe, 0x0) 02:23:12 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:23:12 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000040), 0xff, 0x2aa000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x28, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0xa, 0x0, 0x0, 0x1, [@generic="487fec864b24"]}]}, 0x28}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2, {r1}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), r2) sendmsg$TIPC_NL_BEARER_GET(r3, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, r4, 0x2, 0x70bd2c, 0x25dfdbff}, 0x14}}, 0x40090) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xcc, r4, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xb8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast1}}}}, @TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'ip6tnl0\x00'}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x1ff, @private0, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e20, @remote}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xde}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x8084}, 0x100) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f00000000c0)={0x270, r4, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x4}, @TIPC_NLA_NET={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffff7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xc}]}, @TIPC_NLA_NODE={0x198, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "bdf4a776340d4cd85cb9982907b0d6a087c54db33b3677eb2818eeb0b6d8"}}, @TIPC_NLA_NODE_ID={0x26, 0x3, "88834980be2c1faa52f2971319fb5a85fda56ac3e3666dc3e3ab971a6b57d983ebc0"}, @TIPC_NLA_NODE_ID={0xd9, 0x3, "3ed26fb6d962c17c42e10bdd37a5e8a3d525cedfbb28e28ac4ee73c59ca6c06ab8f83b753f0863f9a54b14afc6c7bd7b411540b01951a684a1a2b086b6fcda74d853208bc398a017283f4023c48c02c3328bc1a699ea29cf8987204534e3b25685fdca4d24e12eb36f42a17500a5eb3f23b0137d39802bed57aa5a63adf53d889711d2b51aacd3ed78835e74c0817277052951265a4e34a06f2294b83f73e5f32415de7e024cf0a47cce66d09d6455ce513e2169165eb0e719ef6a8084d344ba43f266c48dd1c6b87d169ccb3c30df0e6b9c4f1eb1"}, @TIPC_NLA_NODE_KEY={0x42, 0x4, {'gcm(aes)\x00', 0x1a, "ba1e9b8e633d57251f2009e35f1cba81ed580045ee294e35438a"}}]}, @TIPC_NLA_MEDIA={0x40, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}]}, @TIPC_NLA_NET={0x64, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x100}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x81}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5de1b481}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3dfd}]}]}, 0x270}, 0x1, 0x0, 0x0, 0x20040000}, 0x40004804) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) timerfd_gettime(r5, 0x0) [ 2339.215727] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2339.232309] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2339.234238] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2339.251620] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2339.258563] FAULT_INJECTION: forcing a failure. [ 2339.258563] name failslab, interval 1, probability 0, space 0, times 0 [ 2339.260376] CPU: 1 PID: 12592 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 2339.261503] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2339.262867] Call Trace: [ 2339.263315] dump_stack+0x107/0x167 [ 2339.263922] should_fail.cold+0x5/0xa [ 2339.264547] ? create_object.isra.0+0x3a/0xa20 [ 2339.265298] should_failslab+0x5/0x20 [ 2339.265908] kmem_cache_alloc+0x5b/0x310 [ 2339.266568] ? pagecache_get_page+0x243/0xc80 [ 2339.267321] create_object.isra.0+0x3a/0xa20 [ 2339.268045] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2339.268877] kmem_cache_alloc+0x159/0x310 [ 2339.269472] ext4_free_blocks+0x10ef/0x21f0 [ 2339.270186] ? ext4_mb_new_blocks+0x45c0/0x45c0 [ 2339.270964] ? __ext4_journal_ensure_credits+0x263/0x2e0 [ 2339.271864] ext4_ext_remove_space+0x1ef7/0x3d90 [ 2339.272670] ? ext4_ext_index_trans_blocks+0x170/0x170 [ 2339.273533] ? ext4_es_lookup_extent+0xaa0/0xaa0 [ 2339.274311] ? down_write+0xe0/0x160 [ 2339.274917] ? down_write_killable+0x180/0x180 [ 2339.275682] ext4_ext_truncate+0x1ea/0x250 [ 2339.276377] ext4_truncate+0xc38/0x1160 [ 2339.276905] ? ext4_punch_hole+0x1070/0x1070 [ 2339.277627] ? __ext4_journal_start_sb+0x214/0x390 [ 2339.278429] ? __ext4_journal_start_sb+0x1db/0x390 [ 2339.279241] ext4_evict_inode+0xae0/0x1a60 [ 2339.279949] ? ext4_da_write_begin+0xd40/0xd40 [ 2339.280696] ? rwlock_bug.part.0+0x90/0x90 [ 2339.281386] ? ext4_da_write_begin+0xd40/0xd40 [ 2339.282130] evict+0x32b/0x8c0 [ 2339.282657] ? new_inode+0x250/0x250 [ 2339.283161] ? lock_downgrade+0x6d0/0x6d0 [ 2339.283840] ? rwlock_bug.part.0+0x90/0x90 [ 2339.284525] ? fsnotify_grab_connector+0x11a/0x250 [ 2339.285329] iput.part.0+0x4b9/0x6d0 [ 2339.285921] ? trace_event_raw_event_ext4_es_lookup_extent_enter+0x300/0x300 [ 2339.287078] iput+0x58/0x70 [ 2339.287567] dentry_unlink_inode+0x2bb/0x470 [ 2339.288283] __dentry_kill+0x36f/0x5c0 [ 2339.288917] ? dput+0x35/0xcd0 [ 2339.289435] dput+0x6f4/0xcd0 [ 2339.289863] do_renameat2+0x715/0xbf0 [ 2339.290488] ? __ia32_sys_link+0x80/0x80 [ 2339.291155] ? __virt_addr_valid+0x170/0x5d0 [ 2339.291750] ? __check_object_size+0x319/0x440 [ 2339.292519] __x64_sys_rename+0x7d/0xa0 [ 2339.293163] do_syscall_64+0x33/0x40 [ 2339.293764] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2339.294595] RIP: 0033:0x7ff904be4b19 [ 2339.295195] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2339.297633] RSP: 002b:00007ff90215a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 2339.298861] RAX: ffffffffffffffda RBX: 00007ff904cf7f60 RCX: 00007ff904be4b19 [ 2339.299854] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 2339.300812] RBP: 00007ff90215a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2339.301957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2339.302947] R13: 00007ffff65566bf R14: 00007ff90215a300 R15: 0000000000022000 [ 2339.314050] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2339.315805] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 02:23:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) acct(&(0x7f00000000c0)='./file1/file0\x00') recvmmsg(r0, &(0x7f0000000200)=[{{&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000100)=""/220, 0xdc}, 0xe6c}], 0x1, 0x1040, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000240), &(0x7f0000000280)='./file1/file0\x00', 0xe, 0x1) timerfd_gettime(r0, 0x0) [ 2339.326858] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2339.352602] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2339.354493] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 02:23:12 executing program 4: socket$inet(0x2, 0xa, 0x300) syz_emit_ethernet(0x3e, &(0x7f00000001c0)=ANY=[@ANYBLOB="0180c2000000ffffffffffff91000000810000008100450000280000000000069078ac1e0001ac1414bb00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) timerfd_gettime(r0, 0x0) [ 2339.371840] 9pnet: Insufficient options for proto=fd [ 2339.374497] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2339.386607] 9pnet: Insufficient options for proto=fd 02:23:12 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 15) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:23:12 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c5", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) name_to_handle_at(r0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280)=@FILEID_BTRFS_WITHOUT_PARENT={0x28, 0x4e, {0x10001, 0x1, 0x3ff, 0x6, 0x2, 0x61}}, &(0x7f00000002c0), 0x400) 02:23:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) mkdirat(r0, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x110) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x4000, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x1, 0x0, 0x1f, 0x0, 0x0, 0x8, 0x10000, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7f2, 0x4, @perf_config_ext={0x100, 0x7f}, 0x48090, 0x2, 0x78, 0x3, 0x52, 0x5, 0xff, 0x0, 0x8, 0x0, 0x4}, 0xffffffffffffffff, 0x8, r2, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x0, 0xda, 0x4, 0x5, 0x0, 0x1, 0x28e2, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x82f0, 0xfffffffffffff932, 0x7fffffff, 0x4, 0x2, 0x5, 0x1000, 0x0, 0x7, 0x0, 0x5}, 0x0, 0xe, r2, 0x8) [ 2339.460578] syz-executor.4 uses obsolete (PF_INET,SOCK_PACKET) 02:23:12 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:23:12 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:23:12 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2339.484627] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2339.487757] FAULT_INJECTION: forcing a failure. [ 2339.487757] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2339.489531] CPU: 1 PID: 12616 Comm: syz-executor.7 Not tainted 5.10.236 #1 [ 2339.490526] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2339.491612] Call Trace: [ 2339.491992] dump_stack+0x107/0x167 [ 2339.492433] should_fail.cold+0x5/0xa [ 2339.492990] _copy_from_user+0x2e/0x1b0 [ 2339.493511] kstrtouint_from_user+0xbd/0x220 [ 2339.494151] ? kstrtou8_from_user+0x210/0x210 [ 2339.494741] ? lock_acquire+0x197/0x470 [ 2339.495332] ? ksys_write+0x12d/0x260 [ 2339.495799] proc_fail_nth_write+0x78/0x220 [ 2339.496426] ? proc_task_getattr+0x1f0/0x1f0 [ 2339.496966] ? proc_task_getattr+0x1f0/0x1f0 [ 2339.497617] vfs_write+0x29a/0xb10 [ 2339.498049] ksys_write+0x12d/0x260 [ 2339.498580] ? __ia32_sys_read+0xb0/0xb0 [ 2339.499063] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2339.499842] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2339.500600] do_syscall_64+0x33/0x40 [ 2339.501039] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2339.501766] RIP: 0033:0x7ff904b975ff [ 2339.502243] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 2339.504472] RSP: 002b:00007ff90215a170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 2339.505395] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff904b975ff [ 2339.506253] RDX: 0000000000000001 RSI: 00007ff90215a1e0 RDI: 0000000000000004 [ 2339.507114] RBP: 00007ff90215a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2339.507979] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2339.508840] R13: 00007ffff65566bf R14: 00007ff90215a300 R15: 0000000000022000 02:23:12 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x0) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2339.531601] 9pnet: Insufficient options for proto=fd [ 2339.574619] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2339.576358] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 02:23:12 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2339.578371] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2339.589418] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 02:23:12 executing program 4: timerfd_gettime(0xffffffffffffffff, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000100)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000080)) r2 = getpid() capget(&(0x7f0000000100)={0x20080522, r2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x400}) fcntl$getownex(r1, 0x10, &(0x7f0000000300)={0x0, 0x0}) clone3(&(0x7f0000000380)={0x4080000, &(0x7f0000000140), &(0x7f0000000400), &(0x7f00000001c0), {0x7}, &(0x7f0000000180)=""/49, 0x31, &(0x7f0000000240)=""/135, &(0x7f0000000340)=[r3, r3], 0x2}, 0x58) 02:23:12 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:23:12 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) [ 2339.650774] 9pnet: Insufficient options for proto=fd [ 2339.654223] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2339.727643] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2339.729647] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2339.731247] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2339.733116] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2339.735515] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2339.738482] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:23:26 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', 0x0, 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:23:26 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x0) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:23:26 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:23:26 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2353.915876] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2353.954405] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 02:23:26 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000200)='./mnt\x00', 0x4001, 0x20) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c5", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 02:23:26 executing program 4: stat(&(0x7f00000001c0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x2, 0x0) r2 = accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14) r3 = signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x80000) r4 = syz_io_uring_setup(0x68d4, &(0x7f0000000100), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r4, 0x0, &(0x7f0000000000)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_BUFFERS(r4, 0x0, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000200)={'#! ', './file1/file0', [{0x20, '&'}, {}, {0x20, './binderfs/binder0\x00'}, {0x20, './binderfs/binder0\x00'}, {0x20, './binderfs/binder0\x00'}, {0x20, './binderfs/binder0\x00'}, {0x20, '*$'}], 0xa, "7b3c19ee7ecca4"}, 0x6e) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080)=0xffff, 0x80000001) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) timerfd_gettime(r3, 0x0) 02:23:26 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, 0x0, 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:23:26 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x400}}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = getpid() capget(&(0x7f0000000100)={0x20080522, r2}, &(0x7f0000000140)) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x6, 0x9, 0x8, 0x4, 0x0, 0x7e, 0x400, 0x1e, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x4, 0x4, 0x7, 0x0, 0x6, 0x5, 0x0, 0x1, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0x2) [ 2354.032872] 9pnet: Insufficient options for proto=fd [ 2354.043285] 9pnet: Insufficient options for proto=fd [ 2354.043739] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2354.046522] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2354.051625] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2354.064689] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2354.066341] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2354.068822] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:23:42 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', 0x0, 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:23:42 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r3, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(0xffffffffffffffff, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r4 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:23:42 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c5", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 02:23:42 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, 0x0, 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:23:42 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:23:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) timerfd_gettime(r0, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x21001, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)="f9c26f1d62e10b57c6f532", 0xb}], 0x1) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) openat(r1, &(0x7f00000000c0)='./file1\x00', 0x1, 0x14) 02:23:42 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)={0x2c, 0x0, 0x1, 0x0, 0x0, {0x8}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_EEE_MODES_OURS={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xfffffffffffffc9a}, @ETHTOOL_A_BITSET_MASK={0x4}]}]}, 0x2c}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0xe, &(0x7f0000000280)={@empty, r3}, 0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000002c0)={@dev={0xfe, 0x80, '\x00', 0x3e}, 0x5a, r3}) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x1872012, &(0x7f0000000680)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@cachetag={'cachetag', 0x3d, 'debug'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,u\xec\xae\xdcI\xd7\xe55\xfc\x06\xb4\x865\x1a\x95\xa6\xd7\x7fmK\x04\x991m\xf1\xc7\xd1\x03@f\x8c\xcd\x0f\xb0`\x93\x05M\n\xb2\x93W\tV', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x0, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x30, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x38]}}}, {@obj_type}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2370.024542] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 02:23:42 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x4}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0}, 0x0, 0x2203, 0x0, {0x1}}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x8}, 0x5) syz_io_uring_submit(r1, 0x0, &(0x7f0000000f40)=@IORING_OP_SENDMSG={0x9, 0x3, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)={&(0x7f0000000a80)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e22}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)="a532ef016529205ff33f69538d59b45a97338a880ea55a5a4b0b0aaf431d0fd97b634e1d7733e0d33e3099ca48ff1dcc990f4ab88bc467059b3a9536d62e721dbd6412a4f0fc", 0x46}], 0x1, &(0x7f0000000bc0)=[{0x110, 0x110, 0x2, "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"}, {0x50, 0x112, 0x800, "c571874830569cdec65c381678e7d553e85cf26cd81e7effe38eb3394dd96ecf70cd66f98a9fc68bf2f10c567d85aae02dfbe3c5cdccaa1aea4f9cf8828af7"}, {0x68, 0x117, 0x7, "83ecce50e954f38f7bcddf7062465cceb6e6c444947b74ac156bbc164a31a7d98f077b8aa28960dc8ddfb45d27afb7d70782679688ccd4ddbc82f10e9ce3adb7ff8455f72e818cfdbb1114c871f000ffb9"}, {0xd0, 0x11, 0x6d5206db, "5a72a90605cdc3c94a3a2e29c56e2d220d94f8c56384d80cd9721395b99aebc0f7660a39d45f66c5c558654f5f908c9139e89fa9a3900cc8ed248f740f5810c556bc78625c08849badd4dac9becf91151df466a2dc5808a676213144e3fe66fb4eb139606aa4ad1e987acb1e7cbbdeab8421b6842182961971f8356ecf263cf532c362f269e6a4b6ce8e9a0009d457514f59f7a89112bc800fa018a12adf709a174ded5e9cda273f852c08ead5b28b1b09c27135b39d7057d377d7e69eb0"}, {0x98, 0x116, 0x1, "d69602de680140f583801eaf78aece4af9f1a55abbbec36a8e73f6215952146c4360abd1b0732894da10babed049aaf9cb287b83b17eeaae1e01ab2ad40951b2dbf4bfb6393267137e38c5ad28f663ed4a6a8c9d697144af08b1acb3070328c08215d22314f324b2ad4b37f53e4459ecde340f424aef2fc6b52aa6b65190f1f249408b"}, {0x10, 0x103, 0xffff}], 0x340}, 0x0, 0x40040}, 0x4) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000008, 0x100010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r1, r4, &(0x7f0000000080)=@IORING_OP_POLL_ADD={0x6, 0x1, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, {0x120}, 0x1}, 0x200) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) fchmodat(r0, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x0) [ 2370.057860] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 02:23:42 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) open(&(0x7f00000002c0)='./mnt\x00', 0x60000, 0x1e6) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66736861743d5a282d5e5b5e2db72c2c736d61636b66737472616e736d7574653d002c7063723d30303030303030303030303030303030303033332c636f6e746578743d73746166665f752c6f626a5f747970653d2c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c6673757569643d32623863386232622d390035322d623265332d373361362d61323139340633392c00"]) socket$inet6_udp(0xa, 0x2, 0x0) [ 2370.101863] 9pnet: Insufficient options for proto=fd 02:23:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) timerfd_gettime(r0, 0x0) poll(&(0x7f0000000040)=[{r0, 0x10}], 0x1, 0x3f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) vmsplice(r2, &(0x7f00000007c0)=[{&(0x7f00000005c0)="9178e92d2d1aa9308d847640a5f2752bf08c1637052132ac17f577a3dc814d3db8445f2fa1ce5288352296ebf7752c3ed88e194f5f46dee1c722496cbf6110a509c886911f36386694ea728041e7c2967fcba00e45733abcc0ab4cfee7139b1288ded6189a43ac716e244ecd1a4ad81d4e639721a125d5fb82879a85a8b9c81f36f9d65ff9ecf928209af5947e7d9fa6dd2d401e1d3d678f41adbc45954437713eee4236347b1c1697cccc41feb327d856efd3fad495dd6a1a2ad9b067790385c66d21aa6868b9237328dc82a8ec499341ae1927a7c6293818881ae3c4032bc6d9f0f73f9fce85", 0xe7}, {&(0x7f00000006c0)="0161a62c178eb5c7a61050c800af9a361b5bf48f7380b25e64dbb4fcf783d5fe87d519d1b38f98232db923b3ad5db3566406b7a47aef995d9f581874c74af61509302ce25a1bbfe29ea0501311274cd8f66d9513e612b0d8f9e816c288c9cfce92b6849963a003e155c3093fb226b9d9d0cada019e30660723e567e1527fa3af5959e9af784398c8f20ed1a20e9320844b24781a64d119114dba2e4fd94073f3be75d3ee9409a1aa43729293cfb8e20a85e82f1be41d2288918068e6a0a4fdbb23df72fa6b7089ae98923b4904786d09070bba", 0xd3}], 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="2561dd7f8e00", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_generic(r1, &(0x7f0000000580)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000000c0)=ANY=[@ANYBLOB="440400001100000428bd7000fedbdf2509000000b2003780c0321eb0fb299edce63d44b3e312e5360fd5c784e18acc4be6ebca8a17e731d6fd83375b53eeea98b1350a4a2660e78b27aaa0ea45addd76b3f6d710c5530b8f5507eebaafb2bc21afd3ebb3b9dfaa0a31b025199fc1583f83cea28de4f4c1ec5a1552879adac8124b12200514753516c608004400", @ANYRES32, @ANYBLOB="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"], 0x444}, 0x1, 0x0, 0x0, 0x80}, 0x0) [ 2370.146707] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2370.147960] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 02:23:43 executing program 3: arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000280)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@md0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='securityfs\x00', 0x12, &(0x7f0000000200)='^\x00') perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000300)='./mnt\x00', 0x1, 0x1, &(0x7f0000000340)=[{&(0x7f0000000400)="4c113ea581d611cb8938cafc0ddb3c9ad505d4665776c2a247f0fcc19f1c7cee8d5731341ebaf69004871803c88fcda4296867c61d131bd7e310204dc04297a7df9e8ef410866b81489036ec2e820764f8c5f10ea720029d991f019439e4ef69255c3e0568be5d380bcf99d2e65b5a0af75950dad9b9cf0d9e4db6f93e5c1ade", 0x80, 0x7df}], 0x2000008, &(0x7f0000000480)=ANY=[@ANYBLOB="6e6f6d626c6b5f696f5f7375622cf0220b64696f726561645f6c6f636b2c6e6f6c617a7974696d652c6e6f7265616f766572792c7573726a71756f74613d2c62736464662c6d61736b3d5e4d41595f455845432c00"]) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) [ 2370.149223] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:23:43 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x0, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) [ 2370.181896] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2370.183095] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2370.184376] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:23:43 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', 0x0, 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x35, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)) 02:23:43 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0xa20, 0x89a2, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8e408, 0x0, 0x0, 0x6, 0xfffffffffffffffd, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') r1 = open(&(0x7f0000000280)='./file2\x00', 0x301002, 0x20) chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) getpeername(r0, &(0x7f0000000400)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000480)=0x80) connect$inet6(r2, &(0x7f0000000500)={0xa, 0x4e23, 0x79e, @local, 0x9}, 0x1c) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300), 0x400001, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3, {0x357}}, './file0\x00'}) r4 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) mount(&(0x7f0000000540)=@sg0, &(0x7f0000000580)='./file2\x00', &(0x7f00000005c0)='hugetlbfs\x00', 0x3800140, &(0x7f0000000600)='\x00') ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="011a000000c5000000", @ANYRES32=r4, @ANYBLOB="00000000000000002e2f66696c65300015409e2e"]) [ 2370.202551] loop3: detected capacity change from 0 to 3584 [ 2370.208139] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2370.230049] loop3: detected capacity change from 0 to 3584 [ 2370.234767] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 2370.249865] 9pnet: Insufficient options for proto=fd 02:23:43 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r3, &(0x7f00000002c0)='./file0\x00', 0x10242, 0x4) read(0xffffffffffffffff, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) r4 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 02:23:43 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="f34f27c833653000"]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000000100001000000000000000096000009000500000000000000050000804800000091a4f55db35e005c9c8eabbae99f484902bcfa74a7acf67d74b2a0a1e55297dd608af4"], 0x24}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)=ANY=[@ANYBLOB="01000000010000001800000022710e7c588756c4ef39d0c849a6054a38ca9825315808abef8a909b7efeeff7b8587431a2826cc11c55b2227fd635d804504e2b346211894379a55dfe9272652a63b0341719c5ad15d8c62a14cb36a4b6fad64d690d980ea170014122f463534b39a2fcaee74e7ec41fb43bf1bad062629ac6550db32a8e57472426334b8de5a3c2c94bf85d1913765abc0362b91159d0ada5fb1487a9ef8495b429c90c5fae8528d9910c6c139eb85878d1413f76474a450f60f4e3cafdf7519ba8f33ac75e5e05862384966d022daea338eb15afe68eb5d12ccc000000000000", @ANYRES32=r0, @ANYBLOB="04a50000000000002e2f66696c653100"]) fcntl$lock(r1, 0x5, &(0x7f0000000300)={0x2, 0x2, 0x2, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200002, 0x0) openat(r4, 0x0, 0x10242, 0x4) read(r3, &(0x7f0000000500)=""/122, 0x7a) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0x14, 0x0, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x34004840) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c55b0100", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000200)='veth1_vlan\x00') syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 2370.283437] 9pnet: Insufficient options for proto=fd 02:23:43 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./mnt\x00', &(0x7f0000000080), 0xa22017, &(0x7f0000000400)=ANY=[@ANYBLOB="636c7d6e655f6368696c6472656e2c6e6f707265f3cb0761de336669782c6d06006f72792c556f7072656669782c6e6f7072656669782c72656c656173655f6167656e753d2e2f6d6e742c6673636f6e746578743d757365725f752c6f626a5f757365723d2d000674064cdd4c0ca505bf3a5b7d2d2d2c6d6561231c1145a55ccc362890c26cd694839bfcd17be2cd1ee44d7d4636478ad50d24294201cf6170d356fb560cbfd0abbbfc84121a67639512a685b7418501829ddb72e1f22cf9153cf84e029efebdec8dd0725c70d3be78773cd682eb2f726f8a2bb177795e97d61c44cac6a4cdb64942d732449197e63f39b134bb743016b9"]) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x419, 0x640ba, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000, 0x1d3a}, 0x1000, 0x0, 0x0, 0x0, 0x4, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) rename(&(0x7f0000000180)='./file1/file0\x00', &(0x7f00000001c0)='.\x00') rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') fadvise64(r0, 0x8, 0xffffffff, 0x5) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) 02:23:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080), 0x808404, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_mmap}, {@noextend}, {@loose}, {@cache_none}], [{@seclabel}]}}) timerfd_gettime(r0, 0x0) [ 2370.319358] 9pnet: Insufficient options for proto=fd [ 2370.351191] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 02:23:43 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',mmap,debug=0x0000000000000026,aname=\x00,aname=\x00,privport,appraise_type=imasig,subj_type=%,+@&$},fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66736861743d5a282d5e5b5e2db72c2c736d61636b66737472616e736d7574653d002c7063723d30303030303030303030303030303030303033332c636f6e746578743d73746166665f752c6f626a5f747970653d2c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c6673758e69643d32623863386232622d390035322d623265332d373361362d61123139340633392c00"]) socket$inet6_udp(0xa, 0x2, 0x0) 02:23:43 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000040)='mnt/encrypted_dir/file0\x00', &(0x7f0000000240), 0x1022080, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c8286861f4e0764666c747569643d", @ANYRESHEX=0x0, @ANYBLOB=',debug=0x0000000000000001,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',smackfsroot=\x00,measure,fsuuid=75d14b27-2a05-2c03-530c-afca015f,\x00']) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000280), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@debug={'debug', 0x3d, 0x26}}, {@aname={'aname', 0x3d, '\x00'}}, {@aname={'aname', 0x3d, '\x00'}}, {@privport}], [{@appraise_type}, {@subj_type={'subj_type', 0x3d, '%,+@&$}'}}, {@fowner_gt={'fowner>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'Z(-^[^-\xb7,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x21}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type}, {@euid_gt={'euid>', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0x38, 0x63, 0x38, 0x62, 0x32, 0x62], 0x2d, [0x39, 0x62, 0x0, 0x32], 0x2d, [0x62, 0x32, 0x65, 0x33], 0x2d, [0x37, 0x33, 0x61, 0x36], 0x2d, [0x61, 0x32, 0x31, 0x39, 0x34, 0x6, 0x33, 0x39]}}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) 02:23:43 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, {0x0, r1}}, './mnt\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x14) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="011a0000a3c84e94c5", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) [ 2370.389313] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2370.427925] 9pnet: Insufficient options for proto=fd [ 2370.435055] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2370.436041] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2370.437098] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 02:23:43 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) utimes(&(0x7f0000000440)='./mnt\x00', &(0x7f00000004c0)={{r0, r1/1000+60000}, {0x0, 0x2710}}) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) r2 = syz_io_uring_setup(0x68d4, &(0x7f0000000100), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f0000000000)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000400)={{0x1, 0x1, 0x18, r2}, './file2\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000280)=ANY=[@ANYBLOB="0100000001000000180000007ba3cd2525c875e0650aa7af321a0346fcc3e6047489c31d266146eb8ef0108dc4ff12cb656a0da63c759a6a5ec324e4f71161da4689c1705e622aaa4752332e63cf6c2bfb77f4ccee441e216e32cee6071f3180272a28e36a1d110a0df4d65cfa84446af289e69d416d86c9e9611386f01038b0051b9cd227865c26d21f3e481e78714e23cbf15f1d160a86ae749e76ed34196be3bd5ec8dd00a6ca64d00e63bcc78834cc52b37d13d3d2d08399314c743dff8d00"/208, @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./mnt\x00']) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000240)="af", 0x1}], 0x1) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="011a0000a384c84e94c55b0100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) fsconfig$FSCONFIG_SET_PATH_EMPTY(r3, 0x4, &(0x7f0000000080)='%%\x00', &(0x7f0000000140)='./file1\x00', r4) [ 2370.468808] 9pnet: Insufficient options for proto=fd [ 2370.482537] 9pnet: Insufficient options for proto=fd [ 2370.495838] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2370.496800] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2370.497830] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready VM DIAGNOSIS: 02:28:50 Registers: info registers vcpu 0 RAX=ffffffff83e8ee20 RBX=0000000000000000 RCX=ffffffff83e769bc RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e8f428 RBP=0000000000000000 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85678ec8 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e8ee2e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ff3b3b46000 CR3=000000000f2ce000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000004157ec9800000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e8ee20 RBX=0000000000000001 RCX=ffffffff83e769bc RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e8f428 RBP=0000000000000001 RSP=ffff888008987e70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85678ec8 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e8ee2e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fb0b09bc010 CR3=000000000f2ce000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00ab02fe016c6c6f502e726567616e61 XMM02=20726f747563657865110a0100010101 XMM03=6320636578650e007374726174736572 XMM04=7420636578650b006574616469646e61 XMM05=696e696d20636578650d006567616972 XMM06=6873616d7320636578650a00657a696d XMM07=78650a0073746e696820636578650a00 XMM08=650e00737472617473657220726f7475 XMM09=650b006574616469646e616320636578 XMM10=636578650d0065676169727420636578 XMM11=20636578650a00657a696d696e696d20 XMM12=746e696820636578650a006873616d73 XMM13=6509006c61746f7420636578650a0073 XMM14=7320636578650a007a7a756620636578 XMM15=00006e65672063657865080073646565