0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:32:43 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:32:43 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:32:43 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 591.381860] loop6: detected capacity change from 0 to 41948160 [ 591.396045] loop0: detected capacity change from 0 to 41948160 [ 591.404499] loop5: detected capacity change from 0 to 41948160 [ 591.420316] loop3: detected capacity change from 0 to 41948160 [ 591.426168] loop7: detected capacity change from 0 to 41948160 [ 591.434951] loop1: detected capacity change from 0 to 41948160 12:32:43 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/bus/input/handlers\x00', 0x0, 0x0) close(r0) close(0xffffffffffffffff) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000008540)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000400)}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)}}], 0x2, 0x0) [ 591.456542] loop2: detected capacity change from 0 to 41948160 12:32:43 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/bus/input/handlers\x00', 0x0, 0x0) close(r0) close(0xffffffffffffffff) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000008540)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000400)}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)}}], 0x2, 0x0) 12:32:43 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:32:43 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:32:43 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 591.675080] loop1: detected capacity change from 0 to 41948160 12:32:43 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:32:44 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:32:44 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 591.772269] loop7: detected capacity change from 0 to 41948160 12:32:59 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/bus/input/handlers\x00', 0x0, 0x0) close(r0) close(0xffffffffffffffff) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000008540)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000400)}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)}}], 0x2, 0x0) 12:32:59 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:32:59 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:32:59 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:32:59 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:32:59 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:32:59 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:32:59 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 607.327984] loop7: detected capacity change from 0 to 41948160 [ 607.349790] loop0: detected capacity change from 0 to 41948160 [ 607.353384] loop3: detected capacity change from 0 to 41948160 [ 607.360984] loop5: detected capacity change from 0 to 41948160 [ 607.366285] loop6: detected capacity change from 0 to 41948160 [ 607.372394] loop2: detected capacity change from 0 to 41948160 [ 607.383150] loop1: detected capacity change from 0 to 41948160 12:32:59 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/bus/input/handlers\x00', 0x0, 0x0) close(r0) close(0xffffffffffffffff) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000008540)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000400)='\nu', 0x2}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)}}], 0x2, 0x0) 12:32:59 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:32:59 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:32:59 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:32:59 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:32:59 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/bus/input/handlers\x00', 0x0, 0x0) close(r0) close(0xffffffffffffffff) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000008540)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000400)='\nu', 0x2}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)}}], 0x2, 0x0) 12:32:59 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 607.688035] loop2: detected capacity change from 0 to 41948160 [ 607.729628] loop6: detected capacity change from 0 to 41948160 [ 607.760433] loop1: detected capacity change from 0 to 41948160 12:33:14 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:14 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:14 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:14 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:14 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/bus/input/handlers\x00', 0x0, 0x0) close(r0) close(0xffffffffffffffff) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000008540)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000400)='\nu', 0x2}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)}}], 0x2, 0x0) 12:33:14 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:14 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 621.981275] loop0: detected capacity change from 0 to 41948160 [ 622.002292] loop1: detected capacity change from 0 to 41948160 [ 622.018358] loop2: detected capacity change from 0 to 41948160 [ 622.020725] loop6: detected capacity change from 0 to 41948160 [ 622.023044] loop3: detected capacity change from 0 to 41948160 [ 622.031581] loop5: detected capacity change from 0 to 41948160 12:33:14 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/bus/input/handlers\x00', 0x0, 0x0) close(r0) close(0xffffffffffffffff) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000008540)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000400)='\nu?', 0x3}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)}}], 0x2, 0x0) [ 622.057043] loop7: detected capacity change from 0 to 41948160 12:33:14 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:14 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/bus/input/handlers\x00', 0x0, 0x0) close(r0) close(0xffffffffffffffff) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000008540)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000400)='\nu?', 0x3}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)}}], 0x2, 0x0) 12:33:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:14 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:14 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:14 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:14 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 622.380969] loop7: detected capacity change from 0 to 41948160 [ 622.458927] loop1: detected capacity change from 0 to 41948160 [ 622.463309] loop2: detected capacity change from 0 to 41948160 [ 622.466047] loop3: detected capacity change from 0 to 41948160 [ 622.473497] loop5: detected capacity change from 0 to 41948160 [ 622.477540] loop0: detected capacity change from 0 to 41948160 [ 622.583330] loop6: detected capacity change from 0 to 41948160 12:33:29 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:29 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/bus/input/handlers\x00', 0x0, 0x0) close(r0) close(0xffffffffffffffff) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000008540)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000400)='\nu?', 0x3}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)}}], 0x2, 0x0) 12:33:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 637.311992] loop6: detected capacity change from 0 to 41948160 12:33:29 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:29 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:29 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 637.341076] loop0: detected capacity change from 0 to 41948160 [ 637.345440] loop2: detected capacity change from 0 to 41948160 [ 637.350987] loop7: detected capacity change from 0 to 41948160 [ 637.355420] loop3: detected capacity change from 0 to 41948160 [ 637.361315] loop5: detected capacity change from 0 to 41948160 [ 637.371097] loop1: detected capacity change from 0 to 41948160 12:33:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 637.505853] loop4: detected capacity change from 0 to 41948160 [ 637.518296] loop0: detected capacity change from 0 to 41948160 12:33:29 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 637.646563] loop7: detected capacity change from 0 to 41948160 12:33:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:29 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 637.680179] loop6: detected capacity change from 0 to 41948160 12:33:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 637.706415] loop1: detected capacity change from 0 to 41948160 [ 637.711814] loop3: detected capacity change from 0 to 41948160 12:33:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:44 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:44 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 652.418910] loop4: detected capacity change from 0 to 41948160 [ 652.437340] loop3: detected capacity change from 0 to 41948160 [ 652.443885] loop2: detected capacity change from 0 to 41948160 [ 652.452442] loop1: detected capacity change from 0 to 41948160 [ 652.457349] loop5: detected capacity change from 0 to 41948160 [ 652.467296] loop0: detected capacity change from 0 to 41948160 [ 652.474478] loop7: detected capacity change from 0 to 41948160 [ 652.480254] loop6: detected capacity change from 0 to 41948160 12:33:44 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:44 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 652.727598] loop6: detected capacity change from 0 to 41948160 12:33:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:33:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 652.782052] loop7: detected capacity change from 0 to 41948160 [ 652.807720] loop5: detected capacity change from 0 to 41948160 12:33:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 652.888845] loop1: detected capacity change from 0 to 41948160 [ 652.898270] loop0: detected capacity change from 0 to 41948160 12:34:00 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:00 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:00 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 668.054470] loop4: detected capacity change from 0 to 41948160 [ 668.071458] loop2: detected capacity change from 0 to 41948160 [ 668.076327] loop0: detected capacity change from 0 to 41948160 [ 668.081039] loop1: detected capacity change from 0 to 41948160 [ 668.085998] loop7: detected capacity change from 0 to 41948160 [ 668.090288] loop3: detected capacity change from 0 to 41948160 [ 668.098002] loop5: detected capacity change from 0 to 41948160 [ 668.118701] loop6: detected capacity change from 0 to 41948160 12:34:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:00 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:00 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 668.361638] loop3: detected capacity change from 0 to 41948160 12:34:00 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 668.398155] loop7: detected capacity change from 0 to 41948160 [ 668.411643] loop6: detected capacity change from 0 to 41948160 12:34:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 668.476445] loop5: detected capacity change from 0 to 41948160 12:34:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 668.552027] loop2: detected capacity change from 0 to 41948160 [ 668.590470] loop0: detected capacity change from 0 to 41948160 [ 682.590377] loop1: detected capacity change from 0 to 41948160 12:34:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:14 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:14 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 682.641824] loop6: detected capacity change from 0 to 41948160 12:34:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:14 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 682.654232] loop4: detected capacity change from 0 to 41948160 [ 682.661507] loop7: detected capacity change from 0 to 41948160 [ 682.666163] loop5: detected capacity change from 0 to 41948160 [ 682.681673] loop0: detected capacity change from 0 to 41948160 [ 682.684570] loop3: detected capacity change from 0 to 41948160 [ 682.694462] loop2: detected capacity change from 0 to 41948160 12:34:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 682.846547] loop1: detected capacity change from 0 to 41948160 [ 682.914729] loop2: detected capacity change from 0 to 41948160 12:34:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:36 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:36 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:36 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 704.097227] loop6: detected capacity change from 0 to 41948160 [ 704.113303] loop3: detected capacity change from 0 to 41948160 [ 704.118530] loop5: detected capacity change from 0 to 41948160 [ 704.121200] loop0: detected capacity change from 0 to 41948160 [ 704.125966] loop2: detected capacity change from 0 to 41948160 [ 704.129002] loop1: detected capacity change from 0 to 41948160 [ 704.135575] loop7: detected capacity change from 0 to 41948160 [ 704.141521] loop4: detected capacity change from 0 to 41948160 12:34:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:36 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 704.244648] loop2: detected capacity change from 0 to 41948160 12:34:36 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:36 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 704.330461] loop0: detected capacity change from 0 to 41948160 [ 704.361011] loop7: detected capacity change from 0 to 41948160 12:34:36 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 704.393527] loop1: detected capacity change from 0 to 41948160 12:34:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 704.423089] loop0: detected capacity change from 0 to 41948160 12:34:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 704.505661] loop2: detected capacity change from 0 to 41948160 [ 704.522042] loop5: detected capacity change from 0 to 41948160 [ 704.531429] loop3: detected capacity change from 0 to 41948160 12:34:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 719.721163] loop7: detected capacity change from 0 to 41948160 12:34:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:52 executing program 3: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:52 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:52 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:52 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 719.743062] loop2: detected capacity change from 0 to 41948160 [ 719.748243] loop4: detected capacity change from 0 to 41948160 [ 719.752555] loop6: detected capacity change from 0 to 41948160 [ 719.757870] loop1: detected capacity change from 0 to 41948160 [ 719.765358] loop0: detected capacity change from 0 to 41948160 [ 719.769258] loop5: detected capacity change from 0 to 41948160 12:34:52 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:52 executing program 3: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 719.880951] loop1: detected capacity change from 0 to 41948160 12:34:52 executing program 7: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 719.909569] loop0: detected capacity change from 0 to 41948160 12:34:52 executing program 3: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:52 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:34:52 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 720.030342] loop5: detected capacity change from 0 to 41948160 [ 720.061490] loop0: detected capacity change from 0 to 41948160 12:35:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:06 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:06 executing program 0: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:06 executing program 7: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:06 executing program 3: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 734.237589] loop6: detected capacity change from 0 to 41948160 [ 734.253846] loop3: detected capacity change from 0 to 41948160 [ 734.261629] loop5: detected capacity change from 0 to 41948160 12:35:06 executing program 0: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 734.271151] loop2: detected capacity change from 0 to 41948160 12:35:06 executing program 7: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 734.284296] loop4: detected capacity change from 0 to 41948160 [ 734.300030] loop1: detected capacity change from 0 to 41948160 12:35:06 executing program 3: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 734.436948] loop3: detected capacity change from 0 to 41948160 [ 734.455646] loop5: detected capacity change from 0 to 41948160 [ 734.494474] loop4: detected capacity change from 0 to 41948160 [ 734.506217] loop1: detected capacity change from 0 to 41948160 12:35:21 executing program 0: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:21 executing program 1: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:21 executing program 7: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:21 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:21 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:21 executing program 3: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 748.893160] loop3: detected capacity change from 0 to 41948160 [ 748.930017] loop4: detected capacity change from 0 to 41948160 [ 748.938328] loop6: detected capacity change from 0 to 41948160 12:35:21 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 748.945308] loop7: detected capacity change from 0 to 41948160 [ 748.948648] loop2: detected capacity change from 0 to 41948160 [ 748.955106] loop5: detected capacity change from 0 to 41948160 12:35:21 executing program 1: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 748.992673] loop0: detected capacity change from 0 to 41948160 12:35:21 executing program 7: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 749.111243] loop7: detected capacity change from 0 to 41948160 12:35:35 executing program 1: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:35 executing program 7: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 763.509017] loop7: detected capacity change from 0 to 41948160 12:35:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:35 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:35 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 763.547485] loop0: detected capacity change from 0 to 41948160 12:35:35 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 763.562553] loop3: detected capacity change from 0 to 41948160 [ 763.575561] loop2: detected capacity change from 0 to 41948160 [ 763.583874] loop6: detected capacity change from 0 to 41948160 [ 763.589056] loop5: detected capacity change from 0 to 41948160 [ 763.594231] loop4: detected capacity change from 0 to 41948160 12:35:35 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:36 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 763.764973] loop1: detected capacity change from 0 to 41948160 12:35:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:36 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 763.858497] loop1: detected capacity change from 0 to 41948160 12:35:36 executing program 5: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:36 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 763.872498] loop0: detected capacity change from 0 to 41948160 [ 763.879463] loop3: detected capacity change from 0 to 41948160 12:35:36 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 763.919574] loop6: detected capacity change from 0 to 41948160 [ 763.938928] loop2: detected capacity change from 0 to 41948160 [ 763.942682] loop4: detected capacity change from 0 to 41948160 [ 764.077025] loop7: detected capacity change from 0 to 41948160 12:35:50 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:50 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:50 executing program 2: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:50 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:50 executing program 5: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 778.333645] loop1: detected capacity change from 0 to 41948160 12:35:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:50 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:50 executing program 5: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 778.385247] loop7: detected capacity change from 0 to 41948160 [ 778.391569] loop6: detected capacity change from 0 to 41948160 [ 778.408073] loop0: detected capacity change from 0 to 41948160 12:35:50 executing program 2: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 778.416921] loop4: detected capacity change from 0 to 41948160 12:35:50 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:50 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 778.539112] loop1: detected capacity change from 0 to 41948160 12:35:50 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:35:50 executing program 5: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 778.605006] loop0: detected capacity change from 0 to 41948160 [ 778.630998] loop6: detected capacity change from 0 to 41948160 12:35:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 778.645337] loop5: detected capacity change from 0 to 41948160 [ 778.680196] loop1: detected capacity change from 0 to 41948160 [ 792.599938] loop1: detected capacity change from 0 to 41948160 12:36:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:04 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:04 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:04 executing program 5: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:04 executing program 2: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 792.609719] loop6: detected capacity change from 0 to 41948160 [ 792.614921] loop0: detected capacity change from 0 to 41948160 [ 792.623243] loop4: detected capacity change from 0 to 41948160 12:36:04 executing program 2: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:04 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 792.650819] FAT-fs (loop3): bogus number of reserved sectors [ 792.651860] FAT-fs (loop3): Can't find a valid FAT filesystem [ 792.658927] loop5: detected capacity change from 0 to 41948160 12:36:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 792.739660] loop2: detected capacity change from 0 to 41948160 12:36:05 executing program 5: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:05 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:05 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 792.809948] loop4: detected capacity change from 0 to 41948160 12:36:05 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:05 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 792.861854] FAT-fs (loop7): bogus number of reserved sectors [ 792.866792] FAT-fs (loop7): Can't find a valid FAT filesystem [ 792.869909] loop5: detected capacity change from 0 to 41948160 12:36:05 executing program 2: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:05 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 792.979362] loop2: detected capacity change from 0 to 41948160 12:36:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:05 executing program 2: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 793.052839] FAT-fs (loop7): bogus number of reserved sectors [ 793.053672] FAT-fs (loop7): Can't find a valid FAT filesystem [ 793.078001] loop5: detected capacity change from 0 to 41948160 [ 793.136123] loop2: detected capacity change from 0 to 41948160 12:36:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:19 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:19 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:19 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 807.220888] loop4: detected capacity change from 0 to 41948160 12:36:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 807.252201] FAT-fs (loop1): bogus number of reserved sectors [ 807.253075] FAT-fs (loop1): Can't find a valid FAT filesystem [ 807.255596] loop2: detected capacity change from 0 to 41948160 [ 807.270541] loop5: detected capacity change from 0 to 41948160 [ 807.280408] loop6: detected capacity change from 0 to 41948160 [ 807.287835] FAT-fs (loop7): bogus number of reserved sectors [ 807.288579] FAT-fs (loop7): Can't find a valid FAT filesystem [ 807.313460] FAT-fs (loop3): bogus number of reserved sectors [ 807.314241] FAT-fs (loop3): Can't find a valid FAT filesystem [ 807.377232] FAT-fs (loop0): bogus number of reserved sectors [ 807.378138] FAT-fs (loop0): Can't find a valid FAT filesystem 12:36:33 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:33 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:33 executing program 6: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:33 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 821.522510] FAT-fs (loop0): bogus number of reserved sectors [ 821.537114] FAT-fs (loop0): Can't find a valid FAT filesystem 12:36:33 executing program 6: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 821.560130] loop5: detected capacity change from 0 to 41948160 [ 821.567680] loop2: detected capacity change from 0 to 41948160 [ 821.594605] loop4: detected capacity change from 0 to 41948160 [ 821.600691] FAT-fs (loop1): bogus number of reserved sectors [ 821.601517] FAT-fs (loop1): Can't find a valid FAT filesystem [ 821.628873] FAT-fs (loop7): bogus number of reserved sectors [ 821.629685] FAT-fs (loop7): Can't find a valid FAT filesystem [ 821.631642] FAT-fs (loop3): bogus number of reserved sectors [ 821.632725] FAT-fs (loop3): Can't find a valid FAT filesystem 12:36:33 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:48 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 836.329986] FAT-fs (loop1): bogus number of reserved sectors [ 836.330884] FAT-fs (loop1): Can't find a valid FAT filesystem 12:36:48 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:48 executing program 6: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 836.347296] loop4: detected capacity change from 0 to 41948160 [ 836.354940] loop3: detected capacity change from 0 to 41948160 12:36:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 836.371721] loop2: detected capacity change from 0 to 41948160 [ 836.378006] FAT-fs (loop7): bogus number of reserved sectors [ 836.378840] FAT-fs (loop7): Can't find a valid FAT filesystem [ 836.386002] FAT-fs (loop0): bogus number of reserved sectors [ 836.386924] FAT-fs (loop0): Can't find a valid FAT filesystem [ 836.388828] FAT-fs (loop3): bogus number of reserved sectors [ 836.389596] FAT-fs (loop3): Can't find a valid FAT filesystem 12:36:48 executing program 6: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 836.456532] loop6: detected capacity change from 0 to 41948160 12:36:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:48 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:48 executing program 6: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:48 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 836.543377] loop4: detected capacity change from 0 to 41948160 [ 836.560544] loop6: detected capacity change from 0 to 41948160 [ 836.583020] FAT-fs (loop0): bogus number of reserved sectors [ 836.583886] FAT-fs (loop0): Can't find a valid FAT filesystem [ 836.591057] FAT-fs (loop7): bogus number of reserved sectors [ 836.591911] FAT-fs (loop7): Can't find a valid FAT filesystem [ 836.613712] FAT-fs (loop1): bogus number of reserved sectors [ 836.614724] FAT-fs (loop1): Can't find a valid FAT filesystem [ 836.616549] loop3: detected capacity change from 0 to 41948160 12:36:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 836.673350] FAT-fs (loop3): bogus number of reserved sectors [ 836.674223] FAT-fs (loop3): Can't find a valid FAT filesystem 12:36:48 executing program 6: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:36:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 836.802053] loop6: detected capacity change from 0 to 41948160 [ 836.824603] FAT-fs (loop5): bogus number of reserved sectors [ 836.825484] FAT-fs (loop5): Can't find a valid FAT filesystem [ 836.834318] loop4: detected capacity change from 0 to 41948160 12:37:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:03 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:03 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 850.989233] loop4: detected capacity change from 0 to 41948160 12:37:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 851.007329] loop7: detected capacity change from 0 to 41948160 [ 851.008871] loop3: detected capacity change from 0 to 41948160 [ 851.012227] loop6: detected capacity change from 0 to 41948160 [ 851.023105] FAT-fs (loop5): bogus number of reserved sectors [ 851.023994] FAT-fs (loop5): Can't find a valid FAT filesystem [ 851.024873] FAT-fs (loop7): bogus number of reserved sectors [ 851.025628] FAT-fs (loop7): Can't find a valid FAT filesystem [ 851.031047] FAT-fs (loop3): bogus number of reserved sectors [ 851.031955] FAT-fs (loop3): Can't find a valid FAT filesystem [ 851.034681] FAT-fs (loop1): bogus number of reserved sectors [ 851.035569] FAT-fs (loop1): Can't find a valid FAT filesystem [ 851.043616] FAT-fs (loop0): bogus number of reserved sectors [ 851.044489] FAT-fs (loop0): Can't find a valid FAT filesystem 12:37:03 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:03 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 851.213794] FAT-fs (loop2): bogus number of reserved sectors [ 851.214677] FAT-fs (loop2): Can't find a valid FAT filesystem 12:37:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 851.297138] loop7: detected capacity change from 0 to 41948160 [ 851.312779] loop6: detected capacity change from 0 to 41948160 [ 851.338901] FAT-fs (loop7): bogus number of reserved sectors [ 851.339712] FAT-fs (loop7): Can't find a valid FAT filesystem [ 851.344120] FAT-fs (loop5): bogus number of reserved sectors [ 851.345016] FAT-fs (loop5): Can't find a valid FAT filesystem [ 851.346520] FAT-fs (loop1): bogus number of reserved sectors [ 851.347534] FAT-fs (loop1): Can't find a valid FAT filesystem [ 851.348557] loop3: detected capacity change from 0 to 41948160 [ 851.364837] FAT-fs (loop3): bogus number of reserved sectors [ 851.365633] FAT-fs (loop3): Can't find a valid FAT filesystem 12:37:17 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:17 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 865.163020] loop0: detected capacity change from 0 to 41948160 12:37:17 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:17 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:17 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 865.184989] loop7: detected capacity change from 0 to 41948160 [ 865.191667] FAT-fs (loop0): bogus number of reserved sectors [ 865.193551] FAT-fs (loop0): Can't find a valid FAT filesystem [ 865.196230] loop1: detected capacity change from 0 to 41948160 [ 865.231862] loop6: detected capacity change from 0 to 41948160 [ 865.238945] loop3: detected capacity change from 0 to 41948160 [ 865.245110] loop4: detected capacity change from 0 to 41948160 [ 865.255821] FAT-fs (loop7): bogus number of reserved sectors [ 865.256703] FAT-fs (loop5): bogus number of reserved sectors [ 865.257673] FAT-fs (loop7): Can't find a valid FAT filesystem [ 865.259646] FAT-fs (loop5): Can't find a valid FAT filesystem [ 865.261705] FAT-fs (loop1): bogus number of reserved sectors [ 865.263212] FAT-fs (loop1): Can't find a valid FAT filesystem [ 865.267019] FAT-fs (loop3): bogus number of reserved sectors [ 865.268027] FAT-fs (loop3): Can't find a valid FAT filesystem [ 865.301006] FAT-fs (loop2): bogus number of reserved sectors [ 865.301886] FAT-fs (loop2): Can't find a valid FAT filesystem 12:37:17 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:17 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:17 executing program 4: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:17 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:17 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:17 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 865.471141] loop3: detected capacity change from 0 to 41948160 [ 865.477334] FAT-fs (loop3): bogus number of reserved sectors [ 865.478183] FAT-fs (loop3): Can't find a valid FAT filesystem [ 865.482449] loop7: detected capacity change from 0 to 41948160 [ 865.493455] loop1: detected capacity change from 0 to 41948160 12:37:17 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 865.505473] FAT-fs (loop1): bogus number of reserved sectors [ 865.506311] FAT-fs (loop1): Can't find a valid FAT filesystem [ 865.515778] FAT-fs (loop5): bogus number of reserved sectors [ 865.516547] FAT-fs (loop5): Can't find a valid FAT filesystem [ 865.518703] FAT-fs (loop7): bogus number of reserved sectors [ 865.519734] FAT-fs (loop7): Can't find a valid FAT filesystem [ 879.261386] loop7: detected capacity change from 0 to 41948160 [ 879.268203] FAT-fs (loop7): bogus number of reserved sectors [ 879.269073] FAT-fs (loop7): Can't find a valid FAT filesystem 12:37:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:31 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:31 executing program 4: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:31 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 879.292282] loop1: detected capacity change from 0 to 41948160 [ 879.294485] loop0: detected capacity change from 0 to 41948160 12:37:31 executing program 4: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 879.322236] FAT-fs (loop2): bogus number of reserved sectors [ 879.323118] FAT-fs (loop2): Can't find a valid FAT filesystem [ 879.323176] FAT-fs (loop0): bogus number of reserved sectors [ 879.324811] FAT-fs (loop0): Can't find a valid FAT filesystem [ 879.325343] loop3: detected capacity change from 0 to 41948160 [ 879.336014] FAT-fs (loop3): bogus number of reserved sectors [ 879.336972] FAT-fs (loop3): Can't find a valid FAT filesystem [ 879.338525] FAT-fs (loop1): bogus number of reserved sectors [ 879.339244] FAT-fs (loop5): bogus number of reserved sectors [ 879.339416] FAT-fs (loop1): Can't find a valid FAT filesystem [ 879.340129] FAT-fs (loop5): Can't find a valid FAT filesystem [ 893.321592] loop1: detected capacity change from 0 to 41948160 [ 893.350196] FAT-fs (loop1): bogus number of reserved sectors [ 893.351068] FAT-fs (loop1): Can't find a valid FAT filesystem 12:37:45 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:45 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:45 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 893.368122] FAT-fs (loop6): bogus number of reserved sectors [ 893.368935] FAT-fs (loop6): Can't find a valid FAT filesystem [ 893.376292] loop7: detected capacity change from 0 to 41948160 [ 893.381548] FAT-fs (loop7): bogus number of reserved sectors [ 893.382421] FAT-fs (loop7): Can't find a valid FAT filesystem [ 893.386600] loop3: detected capacity change from 0 to 41948160 [ 893.399353] loop4: detected capacity change from 0 to 41948160 [ 893.411121] loop0: detected capacity change from 0 to 41948160 [ 893.422829] FAT-fs (loop3): bogus number of reserved sectors [ 893.423599] FAT-fs (loop3): Can't find a valid FAT filesystem 12:37:45 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 893.434954] loop5: detected capacity change from 0 to 41948160 [ 893.441395] FAT-fs (loop2): bogus number of reserved sectors [ 893.442265] FAT-fs (loop2): Can't find a valid FAT filesystem 12:37:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 893.451140] FAT-fs (loop0): bogus number of reserved sectors [ 893.452214] FAT-fs (loop0): Can't find a valid FAT filesystem [ 893.485805] FAT-fs (loop5): bogus number of reserved sectors [ 893.486640] FAT-fs (loop5): Can't find a valid FAT filesystem 12:37:45 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 893.506995] loop1: detected capacity change from 0 to 41948160 [ 893.514214] FAT-fs (loop1): bogus number of reserved sectors [ 893.515156] FAT-fs (loop1): Can't find a valid FAT filesystem 12:37:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:45 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 893.593037] loop3: detected capacity change from 0 to 41948160 [ 893.609084] FAT-fs (loop3): bogus number of reserved sectors [ 893.609904] FAT-fs (loop3): Can't find a valid FAT filesystem 12:37:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:45 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 893.652521] loop4: detected capacity change from 0 to 41948160 [ 893.668342] loop7: detected capacity change from 0 to 41948160 [ 893.685548] FAT-fs (loop7): bogus number of reserved sectors [ 893.687502] FAT-fs (loop7): Can't find a valid FAT filesystem [ 893.712586] loop0: detected capacity change from 0 to 41948160 12:37:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:46 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 893.759810] loop5: detected capacity change from 0 to 41948160 [ 893.761498] FAT-fs (loop6): bogus number of reserved sectors [ 893.762260] FAT-fs (loop6): Can't find a valid FAT filesystem [ 893.774923] FAT-fs (loop0): bogus number of reserved sectors [ 893.775760] FAT-fs (loop0): Can't find a valid FAT filesystem 12:37:46 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:37:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 893.848597] FAT-fs (loop2): bogus number of reserved sectors [ 893.849384] FAT-fs (loop2): Can't find a valid FAT filesystem [ 893.887663] FAT-fs (loop5): bogus number of reserved sectors [ 893.888526] FAT-fs (loop5): Can't find a valid FAT filesystem [ 893.921145] loop3: detected capacity change from 0 to 41948160 [ 893.969810] FAT-fs (loop3): bogus number of reserved sectors [ 893.969979] loop4: detected capacity change from 0 to 41948160 [ 893.970600] FAT-fs (loop3): Can't find a valid FAT filesystem [ 893.986052] loop1: detected capacity change from 0 to 41948160 [ 893.990247] loop7: detected capacity change from 0 to 41948160 [ 894.022728] FAT-fs (loop1): bogus number of reserved sectors [ 894.024085] FAT-fs (loop1): Can't find a valid FAT filesystem [ 894.026102] FAT-fs (loop7): bogus number of reserved sectors [ 894.027232] FAT-fs (loop7): Can't find a valid FAT filesystem 12:38:00 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 908.439119] loop7: detected capacity change from 0 to 41948160 12:38:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 908.447971] FAT-fs (loop7): bogus number of reserved sectors [ 908.453322] FAT-fs (loop7): Can't find a valid FAT filesystem 12:38:00 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 908.466973] loop1: detected capacity change from 0 to 41948160 12:38:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 908.483596] loop2: detected capacity change from 0 to 41948160 [ 908.489428] loop5: detected capacity change from 0 to 41948160 [ 908.524198] loop0: detected capacity change from 0 to 41948160 [ 908.534517] FAT-fs (loop1): bogus number of reserved sectors [ 908.536545] FAT-fs (loop1): Can't find a valid FAT filesystem [ 908.542142] FAT-fs (loop2): bogus number of reserved sectors [ 908.544070] FAT-fs (loop2): Can't find a valid FAT filesystem [ 908.545382] loop3: detected capacity change from 0 to 41948160 [ 908.545497] FAT-fs (loop6): bogus number of reserved sectors [ 908.549138] FAT-fs (loop6): Can't find a valid FAT filesystem [ 908.561918] loop4: detected capacity change from 0 to 41948160 [ 908.566684] FAT-fs (loop5): bogus number of reserved sectors [ 908.568665] FAT-fs (loop5): Can't find a valid FAT filesystem [ 908.579083] FAT-fs (loop0): bogus number of reserved sectors [ 908.581158] FAT-fs (loop0): Can't find a valid FAT filesystem [ 908.611967] FAT-fs (loop3): bogus number of reserved sectors [ 908.612888] FAT-fs (loop3): Can't find a valid FAT filesystem 12:38:00 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 908.699968] loop7: detected capacity change from 0 to 41948160 [ 908.714182] FAT-fs (loop7): bogus number of reserved sectors [ 908.716223] FAT-fs (loop7): Can't find a valid FAT filesystem 12:38:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:15 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:15 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 922.789494] loop5: detected capacity change from 0 to 41948160 [ 922.793045] loop7: detected capacity change from 0 to 41948160 [ 922.797307] FAT-fs (loop6): bogus number of reserved sectors [ 922.798192] FAT-fs (loop6): Can't find a valid FAT filesystem [ 922.798703] loop1: detected capacity change from 0 to 41948160 [ 922.801069] loop4: detected capacity change from 0 to 41948160 [ 922.804226] loop2: detected capacity change from 0 to 41948160 [ 922.806479] loop3: detected capacity change from 0 to 41948160 [ 922.810667] loop0: detected capacity change from 0 to 41948160 [ 922.812769] FAT-fs (loop5): bogus number of reserved sectors [ 922.813509] FAT-fs (loop5): Can't find a valid FAT filesystem [ 922.815505] FAT-fs (loop7): bogus number of reserved sectors [ 922.816426] FAT-fs (loop1): bogus number of reserved sectors [ 922.816434] FAT-fs (loop1): Can't find a valid FAT filesystem [ 922.818214] FAT-fs (loop7): Can't find a valid FAT filesystem [ 922.833284] FAT-fs (loop0): bogus number of reserved sectors [ 922.834293] FAT-fs (loop0): Can't find a valid FAT filesystem [ 922.834952] FAT-fs (loop2): bogus number of reserved sectors [ 922.835900] FAT-fs (loop2): Can't find a valid FAT filesystem [ 922.836791] FAT-fs (loop3): bogus number of reserved sectors [ 922.837525] FAT-fs (loop3): Can't find a valid FAT filesystem 12:38:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:15 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:15 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 922.959203] loop0: detected capacity change from 0 to 41948160 12:38:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 923.012909] loop4: detected capacity change from 0 to 41948160 12:38:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 923.031496] FAT-fs (loop6): bogus number of reserved sectors [ 923.032372] FAT-fs (loop6): Can't find a valid FAT filesystem 12:38:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:15 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 923.057487] loop1: detected capacity change from 0 to 41948160 [ 923.077195] loop7: detected capacity change from 0 to 41948160 [ 923.095833] FAT-fs (loop1): bogus number of reserved sectors [ 923.099598] FAT-fs (loop0): bogus number of reserved sectors [ 923.100719] FAT-fs (loop1): Can't find a valid FAT filesystem [ 923.101496] FAT-fs (loop0): Can't find a valid FAT filesystem [ 923.106262] FAT-fs (loop7): bogus number of reserved sectors [ 923.107077] FAT-fs (loop7): Can't find a valid FAT filesystem [ 923.139978] loop3: detected capacity change from 0 to 41948160 [ 923.150929] loop5: detected capacity change from 0 to 41948160 [ 923.151175] FAT-fs (loop3): invalid media value (0x00) [ 923.153706] FAT-fs (loop3): Can't find a valid FAT filesystem [ 923.161365] loop2: detected capacity change from 0 to 41948160 [ 923.176643] FAT-fs (loop2): bogus number of reserved sectors [ 923.178527] FAT-fs (loop2): Can't find a valid FAT filesystem [ 923.188450] loop6: detected capacity change from 0 to 41948160 [ 923.232977] FAT-fs (loop6): bogus number of reserved sectors [ 923.234931] FAT-fs (loop6): Can't find a valid FAT filesystem [ 923.272066] FAT-fs (loop5): bogus number of reserved sectors [ 923.273153] FAT-fs (loop5): Can't find a valid FAT filesystem 12:38:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:29 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:29 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 937.263883] loop3: detected capacity change from 0 to 41948160 [ 937.269908] FAT-fs (loop3): invalid media value (0x00) [ 937.271592] FAT-fs (loop3): Can't find a valid FAT filesystem [ 937.288629] loop5: detected capacity change from 0 to 41948160 12:38:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 937.295836] loop6: detected capacity change from 0 to 41948160 [ 937.297432] FAT-fs (loop5): bogus number of reserved sectors [ 937.305600] FAT-fs (loop5): Can't find a valid FAT filesystem [ 937.312952] loop2: detected capacity change from 0 to 41948160 [ 937.316577] loop1: detected capacity change from 0 to 41948160 [ 937.320871] loop0: detected capacity change from 0 to 41948160 [ 937.323231] loop7: detected capacity change from 0 to 41948160 [ 937.340564] FAT-fs (loop6): bogus number of reserved sectors [ 937.341393] FAT-fs (loop6): Can't find a valid FAT filesystem [ 937.341431] FAT-fs (loop2): bogus number of reserved sectors [ 937.343162] FAT-fs (loop2): Can't find a valid FAT filesystem [ 937.356937] FAT-fs (loop1): bogus number of reserved sectors [ 937.357841] FAT-fs (loop1): Can't find a valid FAT filesystem [ 937.367789] FAT-fs (loop7): invalid media value (0x00) [ 937.368549] FAT-fs (loop7): Can't find a valid FAT filesystem [ 937.369465] FAT-fs (loop0): bogus number of reserved sectors [ 937.370332] FAT-fs (loop0): Can't find a valid FAT filesystem 12:38:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:29 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 937.525397] loop6: detected capacity change from 0 to 41948160 [ 937.543556] loop3: detected capacity change from 0 to 41948160 [ 937.551951] FAT-fs (loop6): bogus number of reserved sectors [ 937.552833] FAT-fs (loop6): Can't find a valid FAT filesystem 12:38:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 937.565125] FAT-fs (loop3): invalid media value (0x00) [ 937.566151] FAT-fs (loop3): Can't find a valid FAT filesystem 12:38:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:29 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:29 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 937.614166] loop5: detected capacity change from 0 to 41948160 12:38:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 937.636387] FAT-fs (loop5): bogus number of reserved sectors [ 937.637453] FAT-fs (loop5): Can't find a valid FAT filesystem [ 937.641305] loop1: detected capacity change from 0 to 41948160 [ 937.674038] loop0: detected capacity change from 0 to 41948160 [ 937.689246] FAT-fs (loop4): bogus number of reserved sectors [ 937.690219] FAT-fs (loop4): Can't find a valid FAT filesystem [ 937.691343] FAT-fs (loop1): invalid media value (0x00) [ 937.692365] FAT-fs (loop1): Can't find a valid FAT filesystem [ 937.695556] loop2: detected capacity change from 0 to 41948160 12:38:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 937.701063] loop6: detected capacity change from 0 to 41948160 [ 937.706363] FAT-fs (loop0): bogus number of reserved sectors [ 937.707427] FAT-fs (loop0): Can't find a valid FAT filesystem [ 937.707653] FAT-fs (loop6): bogus number of reserved sectors [ 937.709409] FAT-fs (loop6): Can't find a valid FAT filesystem [ 937.712221] loop7: detected capacity change from 0 to 41948160 12:38:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 937.731655] FAT-fs (loop2): bogus number of reserved sectors [ 937.732619] FAT-fs (loop2): Can't find a valid FAT filesystem [ 937.743437] FAT-fs (loop7): invalid media value (0x00) [ 937.744542] FAT-fs (loop7): Can't find a valid FAT filesystem [ 937.794099] loop5: detected capacity change from 0 to 41948160 12:38:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 937.826474] loop3: detected capacity change from 0 to 41948160 [ 937.834043] FAT-fs (loop5): bogus number of reserved sectors [ 937.834991] FAT-fs (loop5): Can't find a valid FAT filesystem [ 937.839000] FAT-fs (loop3): invalid media value (0x00) [ 937.839919] FAT-fs (loop3): Can't find a valid FAT filesystem [ 937.896175] loop1: detected capacity change from 0 to 41948160 [ 937.903591] FAT-fs (loop1): invalid media value (0x00) [ 937.904436] FAT-fs (loop1): Can't find a valid FAT filesystem [ 937.932819] FAT-fs (loop4): bogus number of reserved sectors [ 937.933898] FAT-fs (loop4): Can't find a valid FAT filesystem 12:38:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:44 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:44 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 951.982115] loop6: detected capacity change from 0 to 41948160 12:38:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 951.991713] loop2: detected capacity change from 0 to 41948160 [ 951.994529] loop0: detected capacity change from 0 to 41948160 [ 951.996337] FAT-fs (loop6): bogus number of reserved sectors [ 951.997135] FAT-fs (loop6): Can't find a valid FAT filesystem [ 952.004689] loop1: detected capacity change from 0 to 41948160 [ 952.011043] loop7: detected capacity change from 0 to 41948160 [ 952.015510] FAT-fs (loop7): invalid media value (0x00) [ 952.016373] FAT-fs (loop7): Can't find a valid FAT filesystem [ 952.017054] FAT-fs (loop2): bogus number of reserved sectors [ 952.018032] FAT-fs (loop2): Can't find a valid FAT filesystem [ 952.018833] FAT-fs (loop0): bogus number of reserved sectors [ 952.019567] FAT-fs (loop0): Can't find a valid FAT filesystem [ 952.023769] loop3: detected capacity change from 0 to 41948160 [ 952.027209] FAT-fs (loop4): bogus number of reserved sectors [ 952.028074] FAT-fs (loop4): Can't find a valid FAT filesystem [ 952.032693] loop5: detected capacity change from 0 to 41948160 [ 952.035627] FAT-fs (loop1): invalid media value (0x00) [ 952.036376] FAT-fs (loop1): Can't find a valid FAT filesystem [ 952.038461] FAT-fs (loop3): invalid media value (0x00) [ 952.039373] FAT-fs (loop3): Can't find a valid FAT filesystem [ 952.040496] FAT-fs (loop5): bogus number of reserved sectors [ 952.041384] FAT-fs (loop5): Can't find a valid FAT filesystem [ 966.239406] FAT-fs (loop4): bogus number of reserved sectors [ 966.240788] FAT-fs (loop4): Can't find a valid FAT filesystem 12:38:58 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:58 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 966.273027] loop2: detected capacity change from 0 to 41948160 [ 966.285681] loop0: detected capacity change from 0 to 41948160 12:38:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 966.290050] loop5: detected capacity change from 0 to 41948160 [ 966.296104] loop7: detected capacity change from 0 to 41948160 [ 966.303135] FAT-fs (loop2): bogus number of reserved sectors [ 966.304029] FAT-fs (loop2): Can't find a valid FAT filesystem [ 966.306837] loop6: detected capacity change from 0 to 41948160 [ 966.312439] FAT-fs (loop0): bogus number of reserved sectors [ 966.313304] FAT-fs (loop0): Can't find a valid FAT filesystem [ 966.314326] loop1: detected capacity change from 0 to 41948160 [ 966.319764] FAT-fs (loop1): invalid media value (0x00) [ 966.320451] FAT-fs (loop1): Can't find a valid FAT filesystem [ 966.324940] FAT-fs (loop5): bogus number of reserved sectors [ 966.325967] FAT-fs (loop5): Can't find a valid FAT filesystem [ 966.372957] loop3: detected capacity change from 0 to 41948160 [ 966.382235] FAT-fs (loop6): bogus number of reserved sectors [ 966.383227] FAT-fs (loop6): Can't find a valid FAT filesystem [ 966.386349] FAT-fs (loop3): invalid media value (0x00) [ 966.387059] FAT-fs (loop3): Can't find a valid FAT filesystem [ 966.389673] FAT-fs (loop7): invalid media value (0x00) [ 966.390480] FAT-fs (loop7): Can't find a valid FAT filesystem 12:38:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 966.488793] FAT-fs (loop4): bogus number of reserved sectors [ 966.489632] FAT-fs (loop4): Can't find a valid FAT filesystem 12:38:58 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 966.525939] loop1: detected capacity change from 0 to 41948160 12:38:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 966.531609] FAT-fs (loop1): invalid media value (0x00) [ 966.532361] FAT-fs (loop1): Can't find a valid FAT filesystem 12:38:58 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 966.577033] loop5: detected capacity change from 0 to 41948160 12:38:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:38:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 966.613238] loop0: detected capacity change from 0 to 41948160 [ 966.617282] FAT-fs (loop5): bogus number of reserved sectors [ 966.618202] FAT-fs (loop5): Can't find a valid FAT filesystem [ 966.618980] loop3: detected capacity change from 0 to 41948160 [ 966.624947] FAT-fs (loop3): bogus number of FAT sectors [ 966.625672] FAT-fs (loop3): Can't find a valid FAT filesystem [ 966.628007] loop6: detected capacity change from 0 to 41948160 [ 966.631283] loop7: detected capacity change from 0 to 41948160 [ 966.635043] FAT-fs (loop7): invalid media value (0x00) [ 966.635762] FAT-fs (loop7): Can't find a valid FAT filesystem [ 966.641504] FAT-fs (loop0): invalid media value (0x00) [ 966.642234] FAT-fs (loop0): Can't find a valid FAT filesystem [ 966.784016] FAT-fs (loop6): bogus number of reserved sectors [ 966.784883] FAT-fs (loop6): Can't find a valid FAT filesystem [ 966.790042] loop2: detected capacity change from 0 to 41948160 12:38:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 966.885603] loop1: detected capacity change from 0 to 41948160 [ 966.984640] loop3: detected capacity change from 0 to 41948160 [ 966.993621] FAT-fs (loop4): bogus number of reserved sectors [ 966.994455] FAT-fs (loop4): Can't find a valid FAT filesystem [ 966.995824] FAT-fs (loop1): invalid media value (0x00) [ 966.996537] FAT-fs (loop1): Can't find a valid FAT filesystem [ 967.004899] FAT-fs (loop2): bogus number of reserved sectors [ 967.005708] FAT-fs (loop2): Can't find a valid FAT filesystem [ 967.016830] FAT-fs (loop3): bogus number of FAT sectors [ 967.017561] FAT-fs (loop3): Can't find a valid FAT filesystem 12:39:13 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:13 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 981.575520] loop1: detected capacity change from 0 to 41948160 12:39:13 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:13 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 981.591810] FAT-fs (loop1): bogus number of FAT sectors [ 981.592626] FAT-fs (loop1): Can't find a valid FAT filesystem [ 981.595328] loop5: detected capacity change from 0 to 41948160 [ 981.600774] loop6: detected capacity change from 0 to 41948160 [ 981.602944] FAT-fs (loop5): invalid media value (0x00) [ 981.603635] FAT-fs (loop5): Can't find a valid FAT filesystem [ 981.605225] loop2: detected capacity change from 0 to 41948160 [ 981.626840] loop7: detected capacity change from 0 to 41948160 [ 981.657239] loop3: detected capacity change from 0 to 41948160 [ 981.666274] loop4: detected capacity change from 0 to 41948160 [ 981.669958] loop0: detected capacity change from 0 to 41948160 [ 981.675191] FAT-fs (loop6): bogus number of reserved sectors [ 981.676117] FAT-fs (loop6): Can't find a valid FAT filesystem [ 981.707730] FAT-fs (loop2): bogus number of reserved sectors [ 981.708795] FAT-fs (loop2): Can't find a valid FAT filesystem [ 981.735336] FAT-fs (loop7): invalid media value (0x00) [ 981.736207] FAT-fs (loop7): Can't find a valid FAT filesystem [ 981.738667] FAT-fs (loop3): bogus number of FAT sectors [ 981.739524] FAT-fs (loop3): Can't find a valid FAT filesystem [ 981.740368] FAT-fs (loop0): invalid media value (0x00) [ 981.741539] FAT-fs (loop0): Can't find a valid FAT filesystem [ 981.743568] FAT-fs (loop4): bogus number of reserved sectors [ 981.745031] FAT-fs (loop4): Can't find a valid FAT filesystem 12:39:14 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:14 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:14 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 981.933130] loop1: detected capacity change from 0 to 41948160 12:39:14 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 981.957815] FAT-fs (loop1): bogus number of FAT sectors [ 981.958586] FAT-fs (loop1): Can't find a valid FAT filesystem [ 981.960406] loop5: detected capacity change from 0 to 41948160 [ 981.969313] FAT-fs (loop5): invalid media value (0x00) [ 981.970052] FAT-fs (loop5): Can't find a valid FAT filesystem [ 981.985845] loop4: detected capacity change from 0 to 41948160 12:39:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 982.005867] loop7: detected capacity change from 0 to 41948160 12:39:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 982.030044] loop0: detected capacity change from 0 to 41948160 12:39:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 982.044223] FAT-fs (loop4): bogus number of reserved sectors [ 982.049139] FAT-fs (loop4): Can't find a valid FAT filesystem [ 982.059879] FAT-fs (loop7): bogus number of FAT sectors [ 982.060701] FAT-fs (loop7): Can't find a valid FAT filesystem [ 982.089180] FAT-fs (loop0): invalid media value (0x00) [ 982.089981] FAT-fs (loop0): Can't find a valid FAT filesystem [ 982.091088] loop6: detected capacity change from 0 to 41948160 [ 982.111677] FAT-fs (loop6): bogus number of reserved sectors [ 982.112516] FAT-fs (loop6): Can't find a valid FAT filesystem 12:39:14 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 982.171022] loop5: detected capacity change from 0 to 41948160 [ 982.182961] loop1: detected capacity change from 0 to 41948160 12:39:14 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 982.189018] loop2: detected capacity change from 0 to 41948160 [ 982.199396] FAT-fs (loop5): invalid media value (0x00) [ 982.200190] FAT-fs (loop5): Can't find a valid FAT filesystem [ 982.252002] loop3: detected capacity change from 0 to 41948160 [ 982.271014] loop7: detected capacity change from 0 to 41948160 [ 982.278202] FAT-fs (loop1): bogus number of FAT sectors [ 982.279488] FAT-fs (loop1): Can't find a valid FAT filesystem [ 982.286705] FAT-fs (loop2): bogus number of reserved sectors [ 982.287640] FAT-fs (loop2): Can't find a valid FAT filesystem [ 982.301030] loop6: detected capacity change from 0 to 41948160 [ 982.317438] FAT-fs (loop7): bogus number of FAT sectors [ 982.318244] FAT-fs (loop7): Can't find a valid FAT filesystem [ 982.326185] FAT-fs (loop6): bogus number of reserved sectors [ 982.327105] FAT-fs (loop6): Can't find a valid FAT filesystem [ 996.670339] loop7: detected capacity change from 0 to 41948160 [ 996.682199] FAT-fs (loop7): bogus number of FAT sectors [ 996.683069] FAT-fs (loop7): Can't find a valid FAT filesystem 12:39:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:28 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:28 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:28 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 996.705521] loop6: detected capacity change from 0 to 41948160 [ 996.716159] FAT-fs (loop6): bogus number of reserved sectors [ 996.717561] FAT-fs (loop6): Can't find a valid FAT filesystem [ 996.723332] loop1: detected capacity change from 0 to 41948160 [ 996.729255] loop4: detected capacity change from 0 to 41948160 [ 996.731836] loop0: detected capacity change from 0 to 41948160 [ 996.737534] loop2: detected capacity change from 0 to 41948160 [ 996.740085] loop3: detected capacity change from 0 to 41948160 [ 996.746032] loop5: detected capacity change from 0 to 41948160 [ 996.769298] FAT-fs (loop4): bogus number of reserved sectors [ 996.770235] FAT-fs (loop4): Can't find a valid FAT filesystem [ 996.771156] FAT-fs (loop0): invalid media value (0x00) [ 996.771971] FAT-fs (loop0): Can't find a valid FAT filesystem [ 996.775856] FAT-fs (loop2): bogus number of reserved sectors [ 996.776655] FAT-fs (loop2): Can't find a valid FAT filesystem 12:39:29 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 996.802885] FAT-fs (loop5): invalid media value (0x00) [ 996.804839] FAT-fs (loop5): Can't find a valid FAT filesystem 12:39:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 996.915843] loop3: detected capacity change from 0 to 41948160 [ 996.935426] loop7: detected capacity change from 0 to 41948160 12:39:43 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:43 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:43 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1011.103991] loop3: detected capacity change from 0 to 41948160 [ 1011.117263] loop6: detected capacity change from 0 to 41948160 [ 1011.120537] loop1: detected capacity change from 0 to 41948160 [ 1011.127041] loop7: detected capacity change from 0 to 41948160 [ 1011.139730] loop0: detected capacity change from 0 to 41948160 [ 1011.146292] loop2: detected capacity change from 0 to 41948160 [ 1011.154010] loop5: detected capacity change from 0 to 41948160 [ 1011.159390] loop4: detected capacity change from 0 to 41948160 [ 1011.165724] FAT-fs (loop0): invalid media value (0x00) [ 1011.166470] FAT-fs (loop0): Can't find a valid FAT filesystem 12:39:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1011.169831] FAT-fs (loop4): bogus number of reserved sectors [ 1011.170786] FAT-fs (loop6): invalid media value (0x00) [ 1011.173911] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1011.177780] FAT-fs (loop6): Can't find a valid FAT filesystem 12:39:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1011.225685] FAT-fs (loop2): invalid media value (0x00) [ 1011.226506] FAT-fs (loop2): Can't find a valid FAT filesystem 12:39:43 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:43 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1011.289608] FAT-fs (loop5): invalid media value (0x00) [ 1011.290317] FAT-fs (loop5): Can't find a valid FAT filesystem 12:39:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1011.425040] loop1: detected capacity change from 0 to 41948160 12:39:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:43 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1011.440631] loop7: detected capacity change from 0 to 41948160 [ 1011.519934] loop2: detected capacity change from 0 to 41948160 [ 1011.524827] FAT-fs (loop2): invalid media value (0x00) [ 1011.525492] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1011.557307] loop5: detected capacity change from 0 to 41948160 [ 1011.589387] loop0: detected capacity change from 0 to 41948160 [ 1011.693354] FAT-fs (loop5): invalid media value (0x00) [ 1011.693694] FAT-fs (loop0): invalid media value (0x00) [ 1011.694160] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1011.694841] FAT-fs (loop0): Can't find a valid FAT filesystem 12:39:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:58 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1026.069955] loop4: detected capacity change from 0 to 41948160 [ 1026.079641] loop2: detected capacity change from 0 to 41948160 12:39:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:58 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1026.089610] loop1: detected capacity change from 0 to 41948160 [ 1026.097999] loop6: detected capacity change from 0 to 41948160 [ 1026.102219] FAT-fs (loop4): bogus number of reserved sectors [ 1026.103100] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1026.104604] loop5: detected capacity change from 0 to 41948160 [ 1026.108117] loop3: detected capacity change from 0 to 41948160 [ 1026.112091] loop7: detected capacity change from 0 to 41948160 [ 1026.112519] FAT-fs (loop2): invalid media value (0x00) [ 1026.113675] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1026.125648] loop0: detected capacity change from 0 to 41948160 [ 1026.130520] FAT-fs (loop0): bogus number of FAT sectors [ 1026.131249] FAT-fs (loop0): Can't find a valid FAT filesystem [ 1026.173271] FAT-fs (loop6): invalid media value (0x00) [ 1026.174100] FAT-fs (loop6): Can't find a valid FAT filesystem 12:39:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1026.261456] FAT-fs (loop5): bogus number of FAT sectors [ 1026.262273] FAT-fs (loop5): Can't find a valid FAT filesystem 12:39:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:39:58 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1026.431701] loop7: detected capacity change from 0 to 41948160 12:40:12 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:12 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1040.470374] loop0: detected capacity change from 0 to 41948160 [ 1040.474314] FAT-fs (loop0): bogus number of FAT sectors [ 1040.475122] FAT-fs (loop0): Can't find a valid FAT filesystem 12:40:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:12 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1040.497863] loop2: detected capacity change from 0 to 41948160 [ 1040.507061] loop1: detected capacity change from 0 to 41948160 12:40:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1040.513193] loop3: detected capacity change from 0 to 41948160 [ 1040.517285] loop5: detected capacity change from 0 to 41948160 [ 1040.522561] loop6: detected capacity change from 0 to 41948160 [ 1040.527297] loop7: detected capacity change from 0 to 41948160 [ 1040.532797] FAT-fs (loop2): invalid media value (0x00) [ 1040.532867] FAT-fs (loop5): bogus number of FAT sectors [ 1040.533486] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1040.534233] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1040.539337] loop4: detected capacity change from 0 to 41948160 [ 1040.553165] FAT-fs (loop6): invalid media value (0x00) [ 1040.554242] FAT-fs (loop6): Can't find a valid FAT filesystem 12:40:12 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1040.583266] FAT-fs (loop4): bogus number of reserved sectors [ 1040.584180] FAT-fs (loop4): Can't find a valid FAT filesystem 12:40:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:12 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:12 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1040.671084] loop0: detected capacity change from 0 to 41948160 [ 1040.673305] loop1: detected capacity change from 0 to 41948160 [ 1040.690018] loop6: detected capacity change from 0 to 41948160 [ 1040.701265] FAT-fs (loop0): bogus number of FAT sectors [ 1040.702069] FAT-fs (loop0): Can't find a valid FAT filesystem [ 1040.727482] FAT-fs (loop6): invalid media value (0x00) [ 1040.728468] FAT-fs (loop6): Can't find a valid FAT filesystem 12:40:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1040.770563] loop3: detected capacity change from 0 to 41948160 [ 1040.780132] loop5: detected capacity change from 0 to 41948160 12:40:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1040.789921] FAT-fs (loop5): bogus number of FAT sectors [ 1040.790861] FAT-fs (loop5): Can't find a valid FAT filesystem 12:40:13 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1040.804920] loop7: detected capacity change from 0 to 41948160 12:40:13 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1040.824496] loop2: detected capacity change from 0 to 41948160 [ 1040.846564] FAT-fs (loop2): invalid media value (0x00) [ 1040.847286] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1040.850293] loop4: detected capacity change from 0 to 41948160 [ 1040.868679] FAT-fs (loop4): bogus number of reserved sectors [ 1040.869542] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1040.882245] loop0: detected capacity change from 0 to 41948160 12:40:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:13 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1040.921784] loop6: detected capacity change from 0 to 41948160 [ 1040.928044] loop1: detected capacity change from 0 to 41948160 [ 1041.069575] FAT-fs (loop6): invalid media value (0x00) [ 1041.070336] FAT-fs (loop6): Can't find a valid FAT filesystem [ 1041.152032] loop7: detected capacity change from 0 to 41948160 [ 1041.179967] loop3: detected capacity change from 0 to 41948160 [ 1055.464705] loop6: detected capacity change from 0 to 41948160 [ 1055.471975] FAT-fs (loop6): bogus number of FAT sectors [ 1055.473708] FAT-fs (loop6): Can't find a valid FAT filesystem 12:40:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:27 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:27 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:27 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1055.484625] loop4: detected capacity change from 0 to 41948160 [ 1055.494222] loop3: detected capacity change from 0 to 41948160 [ 1055.498728] loop1: detected capacity change from 0 to 41948160 [ 1055.507537] loop0: detected capacity change from 0 to 41948160 [ 1055.515861] loop5: detected capacity change from 0 to 41948160 [ 1055.520647] loop7: detected capacity change from 0 to 41948160 [ 1055.524553] FAT-fs (loop4): bogus number of reserved sectors [ 1055.525391] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1055.529693] loop2: detected capacity change from 0 to 41948160 [ 1055.539129] FAT-fs (loop2): bogus number of FAT sectors [ 1055.539920] FAT-fs (loop2): Can't find a valid FAT filesystem 12:40:27 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:27 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:27 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1055.638424] loop2: detected capacity change from 0 to 41948160 [ 1055.657851] FAT-fs (loop2): bogus number of FAT sectors [ 1055.658607] FAT-fs (loop2): Can't find a valid FAT filesystem 12:40:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1055.666377] loop0: detected capacity change from 0 to 41948160 [ 1055.686552] loop3: detected capacity change from 0 to 41948160 [ 1055.691574] loop7: detected capacity change from 0 to 41948160 [ 1055.730195] loop1: detected capacity change from 0 to 41948160 12:40:41 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1069.423300] loop1: detected capacity change from 0 to 41948160 [ 1069.434601] loop6: detected capacity change from 0 to 41948160 [ 1069.438234] FAT-fs (loop6): bogus number of FAT sectors [ 1069.438956] FAT-fs (loop6): Can't find a valid FAT filesystem 12:40:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:41 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:41 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1069.453654] loop7: detected capacity change from 0 to 41948160 [ 1069.464885] loop0: detected capacity change from 0 to 41948160 [ 1069.472552] loop2: detected capacity change from 0 to 41948160 [ 1069.475096] loop3: detected capacity change from 0 to 41948160 [ 1069.479341] loop4: detected capacity change from 0 to 41948160 [ 1069.482537] loop5: detected capacity change from 0 to 41948160 12:40:41 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1069.519843] FAT-fs (loop4): bogus number of reserved sectors [ 1069.520695] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1069.523052] FAT-fs (loop2): bogus number of FAT sectors [ 1069.524346] FAT-fs (loop2): Can't find a valid FAT filesystem 12:40:41 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:41 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1069.642074] loop6: detected capacity change from 0 to 41948160 [ 1069.654221] loop5: detected capacity change from 0 to 41948160 12:40:41 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1069.727016] loop5: detected capacity change from 0 to 41948160 [ 1069.774282] loop4: detected capacity change from 0 to 41948160 [ 1069.795940] loop3: detected capacity change from 0 to 41948160 [ 1069.820583] FAT-fs (loop4): bogus number of reserved sectors [ 1069.821447] FAT-fs (loop4): Can't find a valid FAT filesystem 12:40:56 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:56 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:56 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1083.782282] loop4: detected capacity change from 0 to 41948160 [ 1083.788306] FAT-fs (loop4): bogus number of reserved sectors [ 1083.789149] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1083.789995] loop3: detected capacity change from 0 to 41948160 [ 1083.793637] loop6: detected capacity change from 0 to 41948160 [ 1083.802562] loop5: detected capacity change from 0 to 41948160 [ 1083.826211] loop1: detected capacity change from 0 to 41948160 [ 1083.831518] loop2: detected capacity change from 0 to 41948160 [ 1083.838759] loop7: detected capacity change from 0 to 41948160 [ 1083.846347] loop0: detected capacity change from 0 to 41948160 12:40:56 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:56 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:40:56 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1084.007286] loop6: detected capacity change from 0 to 41948160 [ 1084.025673] loop5: detected capacity change from 0 to 41948160 [ 1084.066009] loop0: detected capacity change from 0 to 41948160 [ 1084.080239] loop2: detected capacity change from 0 to 41948160 [ 1084.085102] loop1: detected capacity change from 0 to 41948160 [ 1084.087976] loop3: detected capacity change from 0 to 41948160 [ 1084.092378] loop4: detected capacity change from 0 to 41948160 [ 1084.097105] FAT-fs (loop4): invalid media value (0x00) [ 1084.097912] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1084.098009] loop7: detected capacity change from 0 to 41948160 12:41:11 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:11 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:11 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1098.892276] loop6: detected capacity change from 0 to 41948160 [ 1098.962461] loop7: detected capacity change from 0 to 41948160 [ 1098.966857] loop0: detected capacity change from 0 to 41948160 12:41:11 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1098.974590] loop5: detected capacity change from 0 to 41948160 [ 1098.986400] loop4: detected capacity change from 0 to 41948160 [ 1098.988774] loop1: detected capacity change from 0 to 41948160 [ 1099.003611] loop3: detected capacity change from 0 to 41948160 [ 1099.006503] loop2: detected capacity change from 0 to 41948160 [ 1099.022036] FAT-fs (loop4): invalid media value (0x00) [ 1099.022863] FAT-fs (loop4): Can't find a valid FAT filesystem 12:41:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:11 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:11 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1099.149005] loop0: detected capacity change from 0 to 41948160 [ 1099.177976] loop1: detected capacity change from 0 to 41948160 [ 1099.191215] loop5: detected capacity change from 0 to 41948160 [ 1099.195566] loop2: detected capacity change from 0 to 41948160 [ 1099.204802] loop4: detected capacity change from 0 to 41948160 [ 1099.212284] loop7: detected capacity change from 0 to 41948160 [ 1099.254525] FAT-fs (loop4): invalid media value (0x00) [ 1099.255407] FAT-fs (loop4): Can't find a valid FAT filesystem 12:41:26 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1113.891981] loop6: detected capacity change from 0 to 41948160 12:41:26 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:26 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1113.904946] loop0: detected capacity change from 0 to 41948160 [ 1113.912944] loop4: detected capacity change from 0 to 41948160 [ 1113.915935] loop2: detected capacity change from 0 to 41948160 [ 1113.919548] loop3: detected capacity change from 0 to 41948160 [ 1113.923273] loop1: detected capacity change from 0 to 41948160 [ 1113.926249] loop5: detected capacity change from 0 to 41948160 [ 1113.931527] loop7: detected capacity change from 0 to 41948160 [ 1113.946400] FAT-fs (loop4): invalid media value (0x00) [ 1113.947150] FAT-fs (loop4): Can't find a valid FAT filesystem 12:41:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:26 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:26 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:26 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1114.066384] loop3: detected capacity change from 0 to 41948160 [ 1114.089603] loop2: detected capacity change from 0 to 41948160 [ 1114.104009] loop5: detected capacity change from 0 to 41948160 12:41:26 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1114.138287] loop7: detected capacity change from 0 to 41948160 [ 1114.199890] loop1: detected capacity change from 0 to 41948160 [ 1114.218004] loop6: detected capacity change from 0 to 41948160 [ 1128.491700] loop7: detected capacity change from 0 to 41948160 12:41:40 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:40 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:40 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1128.498195] loop1: detected capacity change from 0 to 41948160 [ 1128.502195] loop0: detected capacity change from 0 to 41948160 [ 1128.505117] loop4: detected capacity change from 0 to 41948160 [ 1128.509463] loop6: detected capacity change from 0 to 41948160 [ 1128.514897] loop2: detected capacity change from 0 to 41948160 [ 1128.517933] loop5: detected capacity change from 0 to 41948160 [ 1128.523879] loop3: detected capacity change from 0 to 41948160 [ 1128.532020] FAT-fs (loop4): invalid media value (0x00) [ 1128.532826] FAT-fs (loop4): Can't find a valid FAT filesystem 12:41:40 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 12:41:40 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:40 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') [ 1128.685048] loop5: detected capacity change from 0 to 41948160 [ 1128.743496] loop6: detected capacity change from 0 to 41948160 [ 1128.747184] loop3: detected capacity change from 0 to 41948160 12:41:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1128.754509] loop2: detected capacity change from 0 to 41948160 [ 1128.759011] loop4: detected capacity change from 0 to 41948160 [ 1128.780999] loop0: detected capacity change from 0 to 41948160 [ 1128.808544] FAT-fs (loop4): bogus number of FAT sectors [ 1128.809297] FAT-fs (loop4): Can't find a valid FAT filesystem 12:41:55 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:55 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 12:41:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 12:41:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:55 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1143.503628] loop7: detected capacity change from 0 to 41948160 [ 1143.515981] loop4: detected capacity change from 0 to 41948160 [ 1143.519962] loop3: detected capacity change from 0 to 41948160 [ 1143.522676] loop0: detected capacity change from 0 to 41948160 [ 1143.526517] loop5: detected capacity change from 0 to 41948160 [ 1143.530450] loop2: detected capacity change from 0 to 41948160 [ 1143.539110] loop1: detected capacity change from 0 to 41948160 [ 1143.541499] loop6: detected capacity change from 0 to 41948160 [ 1143.543252] FAT-fs (loop4): bogus number of FAT sectors [ 1143.545008] FAT-fs (loop4): Can't find a valid FAT filesystem 12:41:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:41:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') [ 1143.632728] loop2: detected capacity change from 0 to 41948160 [ 1143.687620] loop3: detected capacity change from 0 to 41948160 [ 1157.960000] loop2: detected capacity change from 0 to 41948160 12:42:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 12:42:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:10 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:10 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 12:42:10 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:10 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1157.979354] loop3: detected capacity change from 0 to 41948160 [ 1157.985999] loop7: detected capacity change from 0 to 41948160 [ 1157.988619] loop0: detected capacity change from 0 to 41948160 [ 1157.993514] loop4: detected capacity change from 0 to 41948160 [ 1157.996579] loop5: detected capacity change from 0 to 41948160 [ 1158.000012] loop1: detected capacity change from 0 to 41948160 [ 1158.005807] loop6: detected capacity change from 0 to 41948160 [ 1158.022137] FAT-fs (loop4): bogus number of FAT sectors [ 1158.022966] FAT-fs (loop4): Can't find a valid FAT filesystem 12:42:10 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:10 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 12:42:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1158.153795] loop5: detected capacity change from 0 to 41948160 12:42:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 1158.174871] loop6: detected capacity change from 0 to 41948160 12:42:10 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:10 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:10 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1158.214408] loop4: detected capacity change from 0 to 41948160 [ 1158.252929] loop1: detected capacity change from 0 to 41948160 [ 1158.281000] loop2: detected capacity change from 0 to 41948160 12:42:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:10 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1158.321473] loop0: detected capacity change from 0 to 41948160 [ 1158.329766] loop7: detected capacity change from 0 to 41948160 12:42:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1158.390159] loop5: detected capacity change from 0 to 41948160 [ 1158.398033] loop6: detected capacity change from 0 to 41948160 [ 1158.415674] loop4: detected capacity change from 0 to 41948160 12:42:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 12:42:24 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:24 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 12:42:24 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1172.511008] loop6: detected capacity change from 0 to 41948160 [ 1172.529282] loop4: detected capacity change from 0 to 41948160 [ 1172.549192] loop7: detected capacity change from 0 to 41948160 12:42:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1172.552059] loop2: detected capacity change from 0 to 41948160 [ 1172.554929] loop0: detected capacity change from 0 to 41948160 [ 1172.558264] loop3: detected capacity change from 0 to 41948160 [ 1172.565275] loop1: detected capacity change from 0 to 41948160 [ 1172.587154] loop5: detected capacity change from 0 to 41948160 12:42:24 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 12:42:25 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 12:42:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:25 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1172.756226] loop7: detected capacity change from 0 to 41948160 12:42:25 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1172.831314] loop2: detected capacity change from 0 to 41948160 [ 1172.840955] loop0: detected capacity change from 0 to 41948160 [ 1172.859216] loop1: detected capacity change from 0 to 41948160 [ 1172.862479] loop5: detected capacity change from 0 to 41948160 12:42:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1172.870992] loop3: detected capacity change from 0 to 41948160 12:42:25 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1172.917803] FAT-fs (loop3): bogus number of FAT sectors [ 1172.918573] FAT-fs (loop3): Can't find a valid FAT filesystem [ 1172.927432] loop6: detected capacity change from 0 to 41948160 12:42:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:40 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:40 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 12:42:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:40 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') [ 1187.959972] loop6: detected capacity change from 0 to 41948160 12:42:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1187.963332] loop7: detected capacity change from 0 to 41948160 [ 1187.972667] loop1: detected capacity change from 0 to 41948160 [ 1187.974942] loop2: detected capacity change from 0 to 41948160 [ 1187.977646] loop0: detected capacity change from 0 to 41948160 [ 1187.979308] loop5: detected capacity change from 0 to 41948160 [ 1188.002672] loop3: detected capacity change from 0 to 41948160 [ 1188.006468] loop4: detected capacity change from 0 to 41948160 [ 1188.014681] FAT-fs (loop3): bogus number of FAT sectors [ 1188.015503] FAT-fs (loop3): Can't find a valid FAT filesystem [ 1188.016817] FAT-fs (loop1): invalid media value (0x00) [ 1188.017540] FAT-fs (loop1): Can't find a valid FAT filesystem 12:42:40 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 12:42:40 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 12:42:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:40 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') [ 1188.151024] loop5: detected capacity change from 0 to 41948160 [ 1188.157618] loop0: detected capacity change from 0 to 41948160 12:42:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1188.187512] loop7: detected capacity change from 0 to 41948160 [ 1188.197503] loop2: detected capacity change from 0 to 41948160 [ 1188.236330] loop3: detected capacity change from 0 to 41948160 [ 1188.279542] loop1: detected capacity change from 0 to 41948160 [ 1188.285521] FAT-fs (loop3): invalid media value (0x00) [ 1188.286318] FAT-fs (loop3): Can't find a valid FAT filesystem [ 1188.313132] FAT-fs (loop1): bogus number of reserved sectors [ 1188.314487] FAT-fs (loop1): Can't find a valid FAT filesystem 12:42:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:54 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:54 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:54 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 12:42:54 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 12:42:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:42:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 12:42:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1202.702998] loop4: detected capacity change from 0 to 41948160 [ 1202.714359] loop6: detected capacity change from 0 to 41948160 [ 1202.717676] loop0: detected capacity change from 0 to 41948160 [ 1202.723274] loop7: detected capacity change from 0 to 41948160 [ 1202.731702] loop5: detected capacity change from 0 to 41948160 [ 1202.739785] loop2: detected capacity change from 0 to 41948160 [ 1202.742544] FAT-fs (loop3): bogus number of reserved sectors [ 1202.743519] FAT-fs (loop3): Can't find a valid FAT filesystem [ 1202.744801] loop1: detected capacity change from 0 to 41948160 [ 1202.817028] FAT-fs (loop1): bogus number of reserved sectors [ 1202.818116] FAT-fs (loop1): Can't find a valid FAT filesystem 12:42:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1202.864951] loop4: detected capacity change from 0 to 41948160 12:43:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 12:43:09 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 12:43:09 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 12:43:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 12:43:09 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1217.056393] loop3: detected capacity change from 0 to 41948160 [ 1217.067397] loop0: detected capacity change from 0 to 41948160 [ 1217.073421] loop4: detected capacity change from 0 to 41948160 [ 1217.078976] loop7: detected capacity change from 0 to 41948160 12:43:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1217.090593] loop5: detected capacity change from 0 to 41948160 [ 1217.096177] loop2: detected capacity change from 0 to 41948160 [ 1217.099065] loop6: detected capacity change from 0 to 41948160 12:43:09 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 12:43:09 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1217.194045] loop6: detected capacity change from 0 to 41948160 12:43:09 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 12:43:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 12:43:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:09 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') [ 1217.235860] loop1: detected capacity change from 0 to 41948160 12:43:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 1217.316574] loop2: detected capacity change from 0 to 41948160 [ 1217.336046] loop7: detected capacity change from 0 to 41948160 [ 1217.354993] loop5: detected capacity change from 0 to 41948160 12:43:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 1217.365396] loop6: detected capacity change from 0 to 41948160 12:43:09 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 12:43:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 1217.470979] loop1: detected capacity change from 0 to 41948160 [ 1217.519557] loop0: detected capacity change from 0 to 41948160 [ 1217.539532] loop2: detected capacity change from 0 to 41948160 [ 1217.548859] loop5: detected capacity change from 0 to 41948160 12:43:24 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 1232.047011] loop5: detected capacity change from 0 to 41948160 12:43:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 12:43:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:24 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:24 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 12:43:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1232.063070] loop6: detected capacity change from 0 to 41948160 [ 1232.083682] loop7: detected capacity change from 0 to 41948160 [ 1232.085908] loop3: detected capacity change from 0 to 41948160 [ 1232.088084] loop2: detected capacity change from 0 to 41948160 [ 1232.094489] loop4: detected capacity change from 0 to 41948160 [ 1232.099211] loop0: detected capacity change from 0 to 41948160 [ 1232.106593] loop1: detected capacity change from 0 to 41948160 12:43:24 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 12:43:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:24 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:24 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') [ 1232.279526] loop4: detected capacity change from 0 to 41948160 12:43:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1232.304234] loop7: detected capacity change from 0 to 41948160 [ 1232.322183] loop1: detected capacity change from 0 to 41948160 12:43:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:24 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) [ 1232.376401] loop2: detected capacity change from 0 to 41948160 [ 1232.413264] loop3: detected capacity change from 0 to 41948160 [ 1232.427891] loop0: detected capacity change from 0 to 41948160 12:43:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:39 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1247.428983] loop3: detected capacity change from 0 to 41948160 12:43:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 12:43:39 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:39 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:39 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:39 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1247.446214] loop1: detected capacity change from 0 to 41948160 [ 1247.451240] loop4: detected capacity change from 0 to 41948160 [ 1247.455376] loop7: detected capacity change from 0 to 41948160 [ 1247.460992] loop5: detected capacity change from 0 to 41948160 [ 1247.467679] loop2: detected capacity change from 0 to 41948160 [ 1247.471546] loop6: detected capacity change from 0 to 41948160 [ 1247.477432] loop0: detected capacity change from 0 to 41948160 12:43:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 12:43:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:39 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1247.724253] loop2: detected capacity change from 0 to 41948160 [ 1247.739858] loop4: detected capacity change from 0 to 41948160 12:43:40 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1247.756821] loop7: detected capacity change from 0 to 41948160 12:43:40 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:40 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:40 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1247.858256] loop3: detected capacity change from 0 to 41948160 [ 1247.877441] loop5: detected capacity change from 0 to 41948160 [ 1247.882995] loop6: detected capacity change from 0 to 41948160 [ 1247.935328] loop1: detected capacity change from 0 to 41948160 12:43:54 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 12:43:54 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:54 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:54 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:54 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1262.186168] loop6: detected capacity change from 0 to 41948160 [ 1262.191278] loop2: detected capacity change from 0 to 41948160 [ 1262.195234] loop1: detected capacity change from 0 to 41948160 [ 1262.199935] loop5: detected capacity change from 0 to 41948160 [ 1262.207574] loop0: detected capacity change from 0 to 41948160 [ 1262.214490] loop7: detected capacity change from 0 to 41948160 [ 1262.217269] loop4: detected capacity change from 0 to 41948160 [ 1262.226677] loop3: detected capacity change from 0 to 41948160 12:43:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1262.354518] loop2: detected capacity change from 0 to 41948160 12:43:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1262.514420] loop4: detected capacity change from 0 to 41948160 12:43:54 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:54 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:54 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:54 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:43:54 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1262.628561] loop6: detected capacity change from 0 to 41948160 12:43:54 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1262.644666] loop2: detected capacity change from 0 to 41948160 [ 1262.660420] loop0: detected capacity change from 0 to 41948160 [ 1262.671337] loop3: detected capacity change from 0 to 41948160 12:43:54 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1262.699814] loop5: detected capacity change from 0 to 41948160 [ 1262.733652] loop7: detected capacity change from 0 to 41948160 [ 1262.767584] loop1: detected capacity change from 0 to 41948160 12:44:09 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:44:09 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:44:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:44:09 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:44:09 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:44:09 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:44:09 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:44:09 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') socket$inet6_udp(0xa, 0x2, 0x0) fstat(r1, &(0x7f0000000780)) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1277.124539] loop1: detected capacity change from 0 to 41948160 [ 1277.149372] loop7: detected capacity change from 0 to 41948160 [ 1277.153038] loop6: detected capacity change from 0 to 41948160 [ 1277.155550] loop4: detected capacity change from 0 to 41948160 [ 1277.160741] loop5: detected capacity change from 0 to 41948160 [ 1277.167372] loop0: detected capacity change from 0 to 41948160 [ 1277.175553] loop2: detected capacity change from 0 to 41948160 [ 1277.178886] loop3: detected capacity change from 0 to 41948160 12:44:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1277.266228] loop4: detected capacity change from 0 to 41948160 [ 1291.640774] loop6: detected capacity change from 0 to 41948160 12:44:23 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 12:44:23 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) fstat(r1, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq={'fowner', 0x3d, r6}}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:44:23 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:44:23 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') socket$inet6_udp(0xa, 0x2, 0x0) fstat(r1, &(0x7f0000000780)) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:44:23 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') socket$inet6_udp(0xa, 0x2, 0x0) fstat(r1, &(0x7f0000000780)) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:44:23 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') socket$inet6_udp(0xa, 0x2, 0x0) fstat(r1, &(0x7f0000000780)) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:44:23 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:44:23 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1291.648118] loop4: detected capacity change from 0 to 41948160 [ 1291.653357] loop0: detected capacity change from 0 to 41948160 [ 1291.656131] loop1: detected capacity change from 0 to 41948160 [ 1291.659914] loop7: detected capacity change from 0 to 41948160 [ 1291.662384] loop5: detected capacity change from 0 to 41948160 [ 1291.665404] loop3: detected capacity change from 0 to 41948160 [ 1291.670766] loop2: detected capacity change from 0 to 41948160 12:44:24 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) fstat(r1, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq={'fowner', 0x3d, r6}}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) getdents64(r4, &(0x7f0000001500)=""/4096, 0x1000) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1291.793940] loop5: detected capacity change from 0 to 41948160 12:44:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 12:44:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 1) [ 1291.943319] loop5: detected capacity change from 0 to 41948160 12:44:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') 12:44:24 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 1) 12:44:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 1) [ 1291.987017] FAULT_INJECTION: forcing a failure. [ 1291.987017] name failslab, interval 1, probability 0, space 0, times 1 [ 1291.988716] CPU: 0 PID: 8228 Comm: syz-executor.5 Not tainted 5.10.238 #1 [ 1291.989719] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1291.991006] Call Trace: [ 1291.991372] dump_stack+0x107/0x167 [ 1291.991920] should_fail.cold+0x5/0xa [ 1291.992459] ? getname_flags.part.0+0x50/0x4f0 [ 1291.993132] should_failslab+0x5/0x20 [ 1291.993671] kmem_cache_alloc+0x5b/0x310 [ 1291.994322] getname_flags.part.0+0x50/0x4f0 [ 1291.994981] getname_flags+0x9a/0xe0 [ 1291.995490] __x64_sys_rename+0x56/0xa0 [ 1291.996113] do_syscall_64+0x33/0x40 [ 1291.996651] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1291.997427] RIP: 0033:0x7fe0b67e3b19 [ 1291.998008] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1292.000700] RSP: 002b:00007fe0b3d59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1292.001883] RAX: ffffffffffffffda RBX: 00007fe0b68f6f60 RCX: 00007fe0b67e3b19 [ 1292.002952] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1292.003921] RBP: 00007fe0b3d591d0 R08: 0000000000000000 R09: 0000000000000000 [ 1292.004932] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1292.005929] R13: 00007ffc1e51636f R14: 00007fe0b3d59300 R15: 0000000000022000 12:44:24 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 1) 12:44:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 1) 12:44:24 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x0, 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffff9c, 0x0, 0xfffffffffffffffc}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001a00)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000019c0)={&(0x7f0000000340)=@l2, 0x80, &(0x7f0000001900)=[{&(0x7f0000000640)=""/222, 0xde}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/166, 0xa6}], 0x7, &(0x7f0000001980)=""/63, 0x3f}, 0x0, 0x12101, 0x1, {0x2}}, 0xdc4c) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000100333676c683100"]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000030) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480), 0x2a40080, &(0x7f0000000800)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@noextend}, {@aname}, {@access_user}, {@mmap}, {@version_9p2000}, {@aname}, {@mmap}], [{@fowner_eq}, {@seclabel}, {@dont_hash}, {@smackfsroot={'smackfsroot', 0x3d, ']\\#\''}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr\x00'}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1292.069112] loop4: detected capacity change from 0 to 41948160 [ 1292.081170] loop6: detected capacity change from 0 to 41948160 [ 1292.105377] FAULT_INJECTION: forcing a failure. [ 1292.105377] name failslab, interval 1, probability 0, space 0, times 0 [ 1292.106995] CPU: 1 PID: 8233 Comm: syz-executor.6 Not tainted 5.10.238 #1 [ 1292.107946] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1292.109106] Call Trace: [ 1292.109450] dump_stack+0x107/0x167 [ 1292.109990] should_fail.cold+0x5/0xa [ 1292.110478] ? getname_flags.part.0+0x50/0x4f0 [ 1292.111137] should_failslab+0x5/0x20 [ 1292.111620] kmem_cache_alloc+0x5b/0x310 [ 1292.112197] getname_flags.part.0+0x50/0x4f0 [ 1292.112823] getname_flags+0x9a/0xe0 [ 1292.113299] __x64_sys_rename+0x56/0xa0 [ 1292.113907] do_syscall_64+0x33/0x40 [ 1292.114377] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1292.115115] RIP: 0033:0x7fa63abe7b19 [ 1292.115587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1292.125789] RSP: 002b:00007fa63815d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1292.126863] RAX: ffffffffffffffda RBX: 00007fa63acfaf60 RCX: 00007fa63abe7b19 [ 1292.127874] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1292.128853] RBP: 00007fa63815d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1292.129847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1292.130815] R13: 00007fffdac8690f R14: 00007fa63815d300 R15: 0000000000022000 12:44:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 1) 12:44:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 2) [ 1292.139757] loop1: detected capacity change from 0 to 41948160 [ 1292.142884] loop0: detected capacity change from 0 to 41948160 [ 1292.158250] loop7: detected capacity change from 0 to 41948160 12:44:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 12:44:24 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 2) [ 1292.161664] loop2: detected capacity change from 0 to 41948160 [ 1292.206970] FAULT_INJECTION: forcing a failure. [ 1292.206970] name failslab, interval 1, probability 0, space 0, times 0 [ 1292.208662] CPU: 0 PID: 8241 Comm: syz-executor.7 Not tainted 5.10.238 #1 [ 1292.209644] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1292.210809] Call Trace: [ 1292.211187] dump_stack+0x107/0x167 [ 1292.211691] should_fail.cold+0x5/0xa [ 1292.212220] ? getname_flags.part.0+0x50/0x4f0 [ 1292.212869] should_failslab+0x5/0x20 [ 1292.213425] kmem_cache_alloc+0x5b/0x310 [ 1292.213985] getname_flags.part.0+0x50/0x4f0 [ 1292.214600] getname_flags+0x9a/0xe0 [ 1292.215116] __x64_sys_rename+0x56/0xa0 [ 1292.215667] do_syscall_64+0x33/0x40 [ 1292.216144] loop3: detected capacity change from 0 to 41948160 [ 1292.216212] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1292.216226] RIP: 0033:0x7f7f35953b19 [ 1292.218283] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1292.220876] RSP: 002b:00007f7f32ec9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1292.221927] RAX: ffffffffffffffda RBX: 00007f7f35a66f60 RCX: 00007f7f35953b19 [ 1292.222931] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1292.223958] RBP: 00007f7f32ec91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1292.228960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1292.229943] R13: 00007ffc91ebe3df R14: 00007f7f32ec9300 R15: 0000000000022000 [ 1292.231493] FAULT_INJECTION: forcing a failure. [ 1292.231493] name failslab, interval 1, probability 0, space 0, times 0 [ 1292.233199] CPU: 1 PID: 8251 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 1292.234282] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1292.235380] Call Trace: [ 1292.235721] dump_stack+0x107/0x167 [ 1292.236211] should_fail.cold+0x5/0xa [ 1292.236683] FAULT_INJECTION: forcing a failure. [ 1292.236683] name failslab, interval 1, probability 0, space 0, times 0 [ 1292.236726] ? getname_flags.part.0+0x50/0x4f0 [ 1292.238879] should_failslab+0x5/0x20 [ 1292.239408] kmem_cache_alloc+0x5b/0x310 [ 1292.240009] getname_flags.part.0+0x50/0x4f0 [ 1292.240596] getname_flags+0x9a/0xe0 [ 1292.241165] __x64_sys_rename+0x56/0xa0 [ 1292.241668] do_syscall_64+0x33/0x40 [ 1292.242265] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1292.242967] RIP: 0033:0x7f574a1c6b19 [ 1292.243441] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1292.246016] RSP: 002b:00007f574773c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1292.247087] RAX: ffffffffffffffda RBX: 00007f574a2d9f60 RCX: 00007f574a1c6b19 [ 1292.248050] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1292.249126] RBP: 00007f574773c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1292.250230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1292.251211] R13: 00007ffe8b5d839f R14: 00007f574773c300 R15: 0000000000022000 [ 1292.252231] CPU: 0 PID: 8253 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1292.257226] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1292.258398] Call Trace: [ 1292.258769] dump_stack+0x107/0x167 [ 1292.259313] should_fail.cold+0x5/0xa [ 1292.259841] ? getname_flags.part.0+0x50/0x4f0 [ 1292.260488] should_failslab+0x5/0x20 [ 1292.261021] kmem_cache_alloc+0x5b/0x310 [ 1292.261605] getname_flags.part.0+0x50/0x4f0 [ 1292.262246] getname_flags+0x9a/0xe0 [ 1292.262769] __x64_sys_rename+0x56/0xa0 [ 1292.263319] do_syscall_64+0x33/0x40 [ 1292.263834] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1292.264571] RIP: 0033:0x7f4eb49c4b19 [ 1292.265085] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 12:44:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 2) [ 1292.267721] RSP: 002b:00007f4eb1f19188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1292.268787] RAX: ffffffffffffffda RBX: 00007f4eb4ad8020 RCX: 00007f4eb49c4b19 [ 1292.273382] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1292.274358] RBP: 00007f4eb1f191d0 R08: 0000000000000000 R09: 0000000000000000 [ 1292.275368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1292.276388] R13: 00007ffdf23d638f R14: 00007f4eb1f19300 R15: 0000000000022000 [ 1292.285389] loop5: detected capacity change from 0 to 41948160 [ 1292.289690] FAULT_INJECTION: forcing a failure. [ 1292.289690] name failslab, interval 1, probability 0, space 0, times 0 [ 1292.291402] CPU: 1 PID: 8239 Comm: syz-executor.1 Not tainted 5.10.238 #1 [ 1292.292403] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1292.293550] Call Trace: [ 1292.293939] dump_stack+0x107/0x167 [ 1292.294443] should_fail.cold+0x5/0xa [ 1292.295044] ? getname_flags.part.0+0x50/0x4f0 [ 1292.295658] should_failslab+0x5/0x20 [ 1292.296227] kmem_cache_alloc+0x5b/0x310 [ 1292.296840] getname_flags.part.0+0x50/0x4f0 [ 1292.297439] getname_flags+0x9a/0xe0 [ 1292.297978] __x64_sys_rename+0x56/0xa0 [ 1292.298539] do_syscall_64+0x33/0x40 [ 1292.299074] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1292.299815] RIP: 0033:0x7f117e426b19 [ 1292.300359] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1292.302884] RSP: 002b:00007f117b99c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1292.303956] RAX: ffffffffffffffda RBX: 00007f117e539f60 RCX: 00007f117e426b19 [ 1292.305021] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1292.305979] RBP: 00007f117b99c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1292.306983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1292.307992] R13: 00007fff9db729bf R14: 00007f117b99c300 R15: 0000000000022000 [ 1292.310131] FAULT_INJECTION: forcing a failure. [ 1292.310131] name failslab, interval 1, probability 0, space 0, times 0 [ 1292.311674] CPU: 1 PID: 8256 Comm: syz-executor.5 Not tainted 5.10.238 #1 [ 1292.312632] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1292.313831] Call Trace: [ 1292.314198] dump_stack+0x107/0x167 [ 1292.314681] should_fail.cold+0x5/0xa [ 1292.315238] ? create_object.isra.0+0x3a/0xa20 [ 1292.315900] should_failslab+0x5/0x20 [ 1292.316399] kmem_cache_alloc+0x5b/0x310 [ 1292.317010] create_object.isra.0+0x3a/0xa20 [ 1292.317569] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1292.318298] kmem_cache_alloc+0x159/0x310 [ 1292.318917] getname_flags.part.0+0x50/0x4f0 [ 1292.319482] getname_flags+0x9a/0xe0 [ 1292.320023] __x64_sys_rename+0x56/0xa0 [ 1292.320544] do_syscall_64+0x33/0x40 [ 1292.324216] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1292.324986] RIP: 0033:0x7fe0b67e3b19 [ 1292.325500] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1292.328059] RSP: 002b:00007fe0b3d38188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1292.329115] RAX: ffffffffffffffda RBX: 00007fe0b68f7020 RCX: 00007fe0b67e3b19 [ 1292.330127] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1292.331110] RBP: 00007fe0b3d381d0 R08: 0000000000000000 R09: 0000000000000000 [ 1292.332102] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1292.333111] R13: 00007ffc1e51636f R14: 00007fe0b3d38300 R15: 0000000000022000 12:44:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 2) 12:44:24 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 1) [ 1292.382269] loop6: detected capacity change from 0 to 41948160 [ 1292.394162] loop4: detected capacity change from 0 to 41948160 [ 1292.413009] FAULT_INJECTION: forcing a failure. [ 1292.413009] name failslab, interval 1, probability 0, space 0, times 0 [ 1292.414507] CPU: 1 PID: 8259 Comm: syz-executor.6 Not tainted 5.10.238 #1 [ 1292.415378] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1292.416461] Call Trace: [ 1292.416805] dump_stack+0x107/0x167 [ 1292.417276] should_fail.cold+0x5/0xa [ 1292.417797] ? create_object.isra.0+0x3a/0xa20 [ 1292.418385] should_failslab+0x5/0x20 [ 1292.418916] kmem_cache_alloc+0x5b/0x310 [ 1292.419442] create_object.isra.0+0x3a/0xa20 [ 1292.420006] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1292.420701] kmem_cache_alloc+0x159/0x310 [ 1292.421235] getname_flags.part.0+0x50/0x4f0 [ 1292.421847] getname_flags+0x9a/0xe0 [ 1292.422328] __x64_sys_rename+0x56/0xa0 [ 1292.422844] do_syscall_64+0x33/0x40 [ 1292.426508] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1292.427212] RIP: 0033:0x7fa63abe7b19 [ 1292.427731] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1292.430502] RSP: 002b:00007fa63815d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1292.431554] RAX: ffffffffffffffda RBX: 00007fa63acfaf60 RCX: 00007fa63abe7b19 [ 1292.432582] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1292.433544] RBP: 00007fa63815d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1292.434625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1292.435627] R13: 00007fffdac8690f R14: 00007fa63815d300 R15: 0000000000022000 [ 1292.446799] loop3: detected capacity change from 0 to 41948160 [ 1292.488954] loop2: detected capacity change from 0 to 41948160 [ 1292.500675] FAULT_INJECTION: forcing a failure. [ 1292.500675] name failslab, interval 1, probability 0, space 0, times 0 [ 1292.502196] CPU: 1 PID: 8264 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 1292.503072] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1292.504158] Call Trace: [ 1292.504519] dump_stack+0x107/0x167 [ 1292.505031] should_fail.cold+0x5/0xa [ 1292.505522] ? create_object.isra.0+0x3a/0xa20 [ 1292.506110] should_failslab+0x5/0x20 [ 1292.506632] kmem_cache_alloc+0x5b/0x310 [ 1292.507154] create_object.isra.0+0x3a/0xa20 [ 1292.507760] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1292.508428] kmem_cache_alloc+0x159/0x310 [ 1292.508966] getname_flags.part.0+0x50/0x4f0 [ 1292.509549] getname_flags+0x9a/0xe0 [ 1292.510040] __x64_sys_rename+0x56/0xa0 [ 1292.510547] do_syscall_64+0x33/0x40 [ 1292.511033] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1292.511688] RIP: 0033:0x7f574a1c6b19 [ 1292.512168] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1292.514622] RSP: 002b:00007f574773c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1292.515613] RAX: ffffffffffffffda RBX: 00007f574a2d9f60 RCX: 00007f574a1c6b19 [ 1292.516573] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1292.517491] RBP: 00007f574773c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1292.518426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1292.519349] R13: 00007ffe8b5d839f R14: 00007f574773c300 R15: 0000000000022000 [ 1292.526314] loop1: detected capacity change from 0 to 41948160 [ 1292.561298] FAULT_INJECTION: forcing a failure. [ 1292.561298] name failslab, interval 1, probability 0, space 0, times 0 [ 1292.563101] CPU: 0 PID: 8268 Comm: syz-executor.2 Not tainted 5.10.238 #1 [ 1292.564080] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1292.565301] Call Trace: [ 1292.565672] dump_stack+0x107/0x167 [ 1292.566256] should_fail.cold+0x5/0xa [ 1292.566879] ? getname_flags.part.0+0x50/0x4f0 [ 1292.567501] should_failslab+0x5/0x20 [ 1292.568113] kmem_cache_alloc+0x5b/0x310 [ 1292.568690] getname_flags.part.0+0x50/0x4f0 [ 1292.569339] getname_flags+0x9a/0xe0 [ 1292.569929] __x64_sys_rename+0x56/0xa0 [ 1292.570468] do_syscall_64+0x33/0x40 [ 1292.571098] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1292.571850] RIP: 0033:0x7f5abea14b19 [ 1292.572368] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1292.575077] RSP: 002b:00007f5abbf8a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1292.576192] RAX: ffffffffffffffda RBX: 00007f5abeb27f60 RCX: 00007f5abea14b19 [ 1292.577233] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1292.578278] RBP: 00007f5abbf8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1292.579305] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1292.580363] R13: 00007ffe1e8b4a0f R14: 00007f5abbf8a300 R15: 0000000000022000 [ 1292.589408] FAULT_INJECTION: forcing a failure. [ 1292.589408] name failslab, interval 1, probability 0, space 0, times 0 [ 1292.591099] CPU: 0 PID: 8270 Comm: syz-executor.1 Not tainted 5.10.238 #1 [ 1292.592116] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1292.593311] Call Trace: [ 1292.593674] dump_stack+0x107/0x167 [ 1292.594250] should_fail.cold+0x5/0xa [ 1292.594814] ? create_object.isra.0+0x3a/0xa20 [ 1292.595448] should_failslab+0x5/0x20 [ 1292.596016] kmem_cache_alloc+0x5b/0x310 [ 1292.596590] create_object.isra.0+0x3a/0xa20 [ 1292.597268] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1292.598055] kmem_cache_alloc+0x159/0x310 [ 1292.598624] getname_flags.part.0+0x50/0x4f0 [ 1292.599307] getname_flags+0x9a/0xe0 [ 1292.599873] __x64_sys_rename+0x56/0xa0 [ 1292.600434] do_syscall_64+0x33/0x40 [ 1292.601037] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1292.601734] RIP: 0033:0x7f117e426b19 [ 1292.602297] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1292.605080] RSP: 002b:00007f117b99c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1292.606206] RAX: ffffffffffffffda RBX: 00007f117e539f60 RCX: 00007f117e426b19 [ 1292.607226] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1292.608273] RBP: 00007f117b99c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1292.609337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1292.610355] R13: 00007fff9db729bf R14: 00007f117b99c300 R15: 0000000000022000 [ 1306.978184] loop2: detected capacity change from 0 to 41948160 12:44:39 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 2) 12:44:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 3) 12:44:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 2) 12:44:39 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 3) 12:44:39 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 2) 12:44:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 3) 12:44:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 12:44:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 3) [ 1306.994023] loop1: detected capacity change from 0 to 41948160 [ 1306.998264] loop0: detected capacity change from 0 to 41948160 [ 1307.003012] loop6: detected capacity change from 0 to 41948160 [ 1307.004590] loop7: detected capacity change from 0 to 41948160 [ 1307.008089] loop5: detected capacity change from 0 to 41948160 [ 1307.015274] loop3: detected capacity change from 0 to 41948160 [ 1307.017678] loop4: detected capacity change from 0 to 41948160 [ 1307.034131] FAULT_INJECTION: forcing a failure. [ 1307.034131] name failslab, interval 1, probability 0, space 0, times 0 [ 1307.034959] FAULT_INJECTION: forcing a failure. [ 1307.034959] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 1307.035647] CPU: 1 PID: 8279 Comm: syz-executor.2 Not tainted 5.10.238 #1 [ 1307.038116] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1307.039176] Call Trace: [ 1307.039518] dump_stack+0x107/0x167 [ 1307.039986] should_fail.cold+0x5/0xa [ 1307.040494] ? create_object.isra.0+0x3a/0xa20 [ 1307.041936] should_failslab+0x5/0x20 [ 1307.042431] kmem_cache_alloc+0x5b/0x310 [ 1307.042960] create_object.isra.0+0x3a/0xa20 [ 1307.043517] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1307.044212] kmem_cache_alloc+0x159/0x310 [ 1307.044759] getname_flags.part.0+0x50/0x4f0 [ 1307.045325] getname_flags+0x9a/0xe0 [ 1307.045802] __x64_sys_rename+0x56/0xa0 [ 1307.046312] do_syscall_64+0x33/0x40 [ 1307.046791] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1307.047462] RIP: 0033:0x7f5abea14b19 [ 1307.047937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1307.050394] RSP: 002b:00007f5abbf8a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1307.051401] RAX: ffffffffffffffda RBX: 00007f5abeb27f60 RCX: 00007f5abea14b19 [ 1307.052317] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1307.053268] RBP: 00007f5abbf8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1307.054180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1307.055125] R13: 00007ffe1e8b4a0f R14: 00007f5abbf8a300 R15: 0000000000022000 [ 1307.056055] CPU: 0 PID: 8286 Comm: syz-executor.6 Not tainted 5.10.238 #1 [ 1307.057110] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1307.058421] Call Trace: [ 1307.058831] dump_stack+0x107/0x167 [ 1307.059441] should_fail.cold+0x5/0xa [ 1307.060038] strncpy_from_user+0x34/0x470 [ 1307.060700] getname_flags.part.0+0x95/0x4f0 [ 1307.061382] getname_flags+0x9a/0xe0 [ 1307.061970] __x64_sys_rename+0x56/0xa0 [ 1307.062594] do_syscall_64+0x33/0x40 [ 1307.063216] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1307.064009] RIP: 0033:0x7fa63abe7b19 [ 1307.066823] FAULT_INJECTION: forcing a failure. [ 1307.066823] name failslab, interval 1, probability 0, space 0, times 0 [ 1307.068597] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1307.068605] RSP: 002b:00007fa63815d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1307.068620] RAX: ffffffffffffffda RBX: 00007fa63acfaf60 RCX: 00007fa63abe7b19 [ 1307.068628] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1307.068635] RBP: 00007fa63815d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1307.068643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1307.068657] R13: 00007fffdac8690f R14: 00007fa63815d300 R15: 0000000000022000 [ 1307.081240] CPU: 1 PID: 8289 Comm: syz-executor.7 Not tainted 5.10.238 #1 [ 1307.083354] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1307.085900] Call Trace: [ 1307.086740] dump_stack+0x107/0x167 [ 1307.087799] should_fail.cold+0x5/0xa [ 1307.088937] ? create_object.isra.0+0x3a/0xa20 [ 1307.090318] should_failslab+0x5/0x20 [ 1307.091443] kmem_cache_alloc+0x5b/0x310 [ 1307.092672] create_object.isra.0+0x3a/0xa20 [ 1307.094040] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1307.095533] kmem_cache_alloc+0x159/0x310 [ 1307.096809] getname_flags.part.0+0x50/0x4f0 [ 1307.098142] getname_flags+0x9a/0xe0 [ 1307.098183] FAULT_INJECTION: forcing a failure. [ 1307.098183] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1307.099243] __x64_sys_rename+0x56/0xa0 [ 1307.099259] do_syscall_64+0x33/0x40 [ 1307.099273] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1307.099288] RIP: 0033:0x7f7f35953b19 [ 1307.103059] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1307.106801] RSP: 002b:00007f7f32ec9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1307.109075] RAX: ffffffffffffffda RBX: 00007f7f35a66f60 RCX: 00007f7f35953b19 [ 1307.111173] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1307.113348] RBP: 00007f7f32ec91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1307.115465] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1307.117655] R13: 00007ffc91ebe3df R14: 00007f7f32ec9300 R15: 0000000000022000 [ 1307.119792] CPU: 0 PID: 8305 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 1307.120902] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1307.122214] Call Trace: [ 1307.122620] dump_stack+0x107/0x167 [ 1307.123209] should_fail.cold+0x5/0xa [ 1307.123820] strncpy_from_user+0x34/0x470 [ 1307.124465] getname_flags.part.0+0x95/0x4f0 [ 1307.125154] getname_flags+0x9a/0xe0 [ 1307.125733] __x64_sys_rename+0x56/0xa0 [ 1307.126352] do_syscall_64+0x33/0x40 [ 1307.126924] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1307.127724] RIP: 0033:0x7f574a1c6b19 [ 1307.128295] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1307.131165] RSP: 002b:00007f574771b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1307.132370] RAX: ffffffffffffffda RBX: 00007f574a2da020 RCX: 00007f574a1c6b19 [ 1307.133407] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1307.134427] RBP: 00007f574771b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1307.135407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1307.136382] R13: 00007ffe8b5d839f R14: 00007f574771b300 R15: 0000000000022000 [ 1307.140921] FAULT_INJECTION: forcing a failure. [ 1307.140921] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1307.142644] CPU: 0 PID: 8284 Comm: syz-executor.1 Not tainted 5.10.238 #1 [ 1307.143588] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1307.144791] Call Trace: [ 1307.145208] dump_stack+0x107/0x167 [ 1307.145790] should_fail.cold+0x5/0xa [ 1307.146389] strncpy_from_user+0x34/0x470 [ 1307.147039] getname_flags.part.0+0x95/0x4f0 [ 1307.147732] getname_flags+0x9a/0xe0 [ 1307.148350] __x64_sys_rename+0x56/0xa0 [ 1307.148922] do_syscall_64+0x33/0x40 [ 1307.149478] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1307.150180] RIP: 0033:0x7f117e426b19 [ 1307.150690] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1307.153248] RSP: 002b:00007f117b99c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1307.154298] RAX: ffffffffffffffda RBX: 00007f117e539f60 RCX: 00007f117e426b19 [ 1307.155277] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1307.156276] RBP: 00007f117b99c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1307.157291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1307.158270] R13: 00007fff9db729bf R14: 00007f117b99c300 R15: 0000000000022000 12:44:39 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 3) [ 1307.163199] FAULT_INJECTION: forcing a failure. [ 1307.163199] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1307.174873] CPU: 0 PID: 8291 Comm: syz-executor.5 Not tainted 5.10.238 #1 [ 1307.176999] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1307.179634] Call Trace: [ 1307.180435] dump_stack+0x107/0x167 [ 1307.181599] should_fail.cold+0x5/0xa [ 1307.182813] strncpy_from_user+0x34/0x470 [ 1307.184112] getname_flags.part.0+0x95/0x4f0 [ 1307.185545] getname_flags+0x9a/0xe0 [ 1307.186688] __x64_sys_rename+0x56/0xa0 [ 1307.187905] do_syscall_64+0x33/0x40 [ 1307.189061] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1307.190681] RIP: 0033:0x7fe0b67e3b19 [ 1307.191817] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1307.197751] RSP: 002b:00007fe0b3d59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1307.200114] RAX: ffffffffffffffda RBX: 00007fe0b68f6f60 RCX: 00007fe0b67e3b19 [ 1307.202459] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1307.208787] RBP: 00007fe0b3d591d0 R08: 0000000000000000 R09: 0000000000000000 [ 1307.211144] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1307.212560] R13: 00007ffc1e51636f R14: 00007fe0b3d59300 R15: 0000000000022000 12:44:39 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 4) [ 1307.224151] FAULT_INJECTION: forcing a failure. [ 1307.224151] name failslab, interval 1, probability 0, space 0, times 0 [ 1307.227890] CPU: 1 PID: 8285 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1307.230146] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1307.232870] Call Trace: [ 1307.233718] dump_stack+0x107/0x167 [ 1307.234823] should_fail.cold+0x5/0xa [ 1307.236029] ? create_object.isra.0+0x3a/0xa20 [ 1307.237527] should_failslab+0x5/0x20 [ 1307.238765] kmem_cache_alloc+0x5b/0x310 [ 1307.240076] create_object.isra.0+0x3a/0xa20 [ 1307.241511] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1307.243125] kmem_cache_alloc+0x159/0x310 [ 1307.244469] getname_flags.part.0+0x50/0x4f0 [ 1307.245903] getname_flags+0x9a/0xe0 [ 1307.247078] __x64_sys_rename+0x56/0xa0 [ 1307.248333] do_syscall_64+0x33/0x40 [ 1307.249553] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1307.251196] RIP: 0033:0x7f4eb49c4b19 [ 1307.252357] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1307.258357] RSP: 002b:00007f4eb1f3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1307.260786] RAX: ffffffffffffffda RBX: 00007f4eb4ad7f60 RCX: 00007f4eb49c4b19 [ 1307.263101] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1307.265362] RBP: 00007f4eb1f3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1307.267708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1307.270020] R13: 00007ffdf23d638f R14: 00007f4eb1f3a300 R15: 0000000000022000 12:44:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 3) 12:44:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', 0x0) 12:44:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 4) [ 1307.325846] FAULT_INJECTION: forcing a failure. [ 1307.325846] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1307.329272] CPU: 0 PID: 8309 Comm: syz-executor.2 Not tainted 5.10.238 #1 [ 1307.330558] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1307.333426] Call Trace: [ 1307.334327] dump_stack+0x107/0x167 [ 1307.335558] should_fail.cold+0x5/0xa [ 1307.336883] strncpy_from_user+0x34/0x470 [ 1307.338346] getname_flags.part.0+0x95/0x4f0 [ 1307.339898] getname_flags+0x9a/0xe0 [ 1307.341226] __x64_sys_rename+0x56/0xa0 [ 1307.342576] do_syscall_64+0x33/0x40 [ 1307.343849] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1307.345688] RIP: 0033:0x7f5abea14b19 [ 1307.346965] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1307.347185] loop7: detected capacity change from 0 to 41948160 [ 1307.353389] RSP: 002b:00007f5abbf8a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1307.353404] RAX: ffffffffffffffda RBX: 00007f5abeb27f60 RCX: 00007f5abea14b19 [ 1307.353412] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1307.353419] RBP: 00007f5abbf8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1307.353434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1307.368017] R13: 00007ffe1e8b4a0f R14: 00007f5abbf8a300 R15: 0000000000022000 [ 1307.385109] loop6: detected capacity change from 0 to 41948160 [ 1307.419185] loop4: detected capacity change from 0 to 41948160 [ 1307.424345] FAULT_INJECTION: forcing a failure. [ 1307.424345] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1307.428182] CPU: 1 PID: 8313 Comm: syz-executor.7 Not tainted 5.10.238 #1 [ 1307.430252] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1307.432767] Call Trace: [ 1307.433592] dump_stack+0x107/0x167 [ 1307.434774] should_fail.cold+0x5/0xa [ 1307.435968] strncpy_from_user+0x34/0x470 [ 1307.437339] getname_flags.part.0+0x95/0x4f0 [ 1307.438756] getname_flags+0x9a/0xe0 [ 1307.439958] __x64_sys_rename+0x56/0xa0 [ 1307.441260] do_syscall_64+0x33/0x40 [ 1307.442427] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1307.444077] RIP: 0033:0x7f7f35953b19 [ 1307.445261] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1307.451190] RSP: 002b:00007f7f32ec9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1307.453486] RAX: ffffffffffffffda RBX: 00007f7f35a66f60 RCX: 00007f7f35953b19 [ 1307.455592] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1307.457764] RBP: 00007f7f32ec91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1307.459896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1307.462045] R13: 00007ffc91ebe3df R14: 00007f7f32ec9300 R15: 0000000000022000 [ 1307.468641] FAULT_INJECTION: forcing a failure. [ 1307.468641] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1307.472204] CPU: 1 PID: 8315 Comm: syz-executor.6 Not tainted 5.10.238 #1 [ 1307.474246] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1307.476730] Call Trace: [ 1307.477504] dump_stack+0x107/0x167 [ 1307.478624] should_fail.cold+0x5/0xa [ 1307.479761] strncpy_from_user+0x34/0x470 [ 1307.481010] getname_flags.part.0+0x95/0x4f0 [ 1307.482308] getname_flags+0x9a/0xe0 [ 1307.483410] __x64_sys_rename+0x56/0xa0 [ 1307.484624] do_syscall_64+0x33/0x40 [ 1307.485716] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1307.487279] RIP: 0033:0x7fa63abe7b19 [ 1307.488372] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1307.494858] RSP: 002b:00007fa63815d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1307.495819] RAX: ffffffffffffffda RBX: 00007fa63acfaf60 RCX: 00007fa63abe7b19 [ 1307.496747] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1307.497668] RBP: 00007fa63815d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1307.498580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1307.499488] R13: 00007fffdac8690f R14: 00007fa63815d300 R15: 0000000000022000 [ 1307.510010] FAULT_INJECTION: forcing a failure. [ 1307.510010] name failslab, interval 1, probability 0, space 0, times 0 [ 1307.511577] CPU: 1 PID: 8323 Comm: syz-executor.1 Not tainted 5.10.238 #1 [ 1307.512453] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1307.513545] Call Trace: [ 1307.513911] dump_stack+0x107/0x167 [ 1307.514410] should_fail.cold+0x5/0xa [ 1307.514930] ? getname_flags.part.0+0x50/0x4f0 [ 1307.515548] should_failslab+0x5/0x20 [ 1307.516068] kmem_cache_alloc+0x5b/0x310 [ 1307.516606] ? strncpy_from_user+0x9e/0x470 [ 1307.517169] getname_flags.part.0+0x50/0x4f0 [ 1307.517733] getname_flags+0x9a/0xe0 [ 1307.518212] __x64_sys_rename+0x65/0xa0 [ 1307.518722] do_syscall_64+0x33/0x40 [ 1307.519201] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1307.519857] RIP: 0033:0x7f117e426b19 [ 1307.520330] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1307.522744] RSP: 002b:00007f117b97b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1307.523717] RAX: ffffffffffffffda RBX: 00007f117e53a020 RCX: 00007f117e426b19 [ 1307.524638] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1307.525553] RBP: 00007f117b97b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1307.526461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1307.527368] R13: 00007fff9db729bf R14: 00007f117b97b300 R15: 0000000000022000 [ 1307.535912] loop1: detected capacity change from 0 to 41948160 12:45:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 4) 12:45:01 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 5) 12:45:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 5) 12:45:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 1) [ 1328.811516] loop4: detected capacity change from 0 to 41948160 12:45:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 4) 12:45:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 3) 12:45:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 4) 12:45:01 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 4) [ 1328.817172] loop5: detected capacity change from 0 to 41948160 [ 1328.822643] loop6: detected capacity change from 0 to 41948160 [ 1328.826394] loop7: detected capacity change from 0 to 41948160 [ 1328.829615] loop1: detected capacity change from 0 to 41948160 [ 1328.832239] loop2: detected capacity change from 0 to 41948160 [ 1328.838135] loop3: detected capacity change from 0 to 41948160 [ 1328.850881] loop0: detected capacity change from 0 to 41948160 [ 1328.867284] FAULT_INJECTION: forcing a failure. [ 1328.867284] name failslab, interval 1, probability 0, space 0, times 0 [ 1328.870959] CPU: 0 PID: 8344 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 1328.872323] FAULT_INJECTION: forcing a failure. [ 1328.872323] name failslab, interval 1, probability 0, space 0, times 0 [ 1328.872802] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1328.872808] Call Trace: [ 1328.872827] dump_stack+0x107/0x167 [ 1328.872847] should_fail.cold+0x5/0xa [ 1328.877018] ? getname_flags.part.0+0x50/0x4f0 [ 1328.878208] should_failslab+0x5/0x20 [ 1328.879222] kmem_cache_alloc+0x5b/0x310 [ 1328.880313] ? strncpy_from_user+0x9e/0x470 [ 1328.881561] getname_flags.part.0+0x50/0x4f0 [ 1328.882705] getname_flags+0x9a/0xe0 [ 1328.883695] __x64_sys_rename+0x65/0xa0 [ 1328.884740] do_syscall_64+0x33/0x40 [ 1328.885878] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1328.887237] RIP: 0033:0x7f574a1c6b19 [ 1328.888214] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1328.893942] RSP: 002b:00007f574773c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1328.896000] RAX: ffffffffffffffda RBX: 00007f574a2d9f60 RCX: 00007f574a1c6b19 [ 1328.898119] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1328.900017] RBP: 00007f574773c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1328.902112] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1328.904021] R13: 00007ffe8b5d839f R14: 00007f574773c300 R15: 0000000000022000 [ 1328.906194] CPU: 1 PID: 8338 Comm: syz-executor.6 Not tainted 5.10.238 #1 [ 1328.907272] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1328.908543] Call Trace: [ 1328.908973] dump_stack+0x107/0x167 [ 1328.909498] should_fail.cold+0x5/0xa [ 1328.910001] ? getname_flags.part.0+0x50/0x4f0 [ 1328.910598] should_failslab+0x5/0x20 [ 1328.911098] kmem_cache_alloc+0x5b/0x310 [ 1328.911658] ? strncpy_from_user+0x9e/0x470 [ 1328.912254] getname_flags.part.0+0x50/0x4f0 [ 1328.912843] getname_flags+0x9a/0xe0 [ 1328.913928] __x64_sys_rename+0x65/0xa0 [ 1328.914961] do_syscall_64+0x33/0x40 [ 1328.915947] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1328.917430] RIP: 0033:0x7fa63abe7b19 [ 1328.918386] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1328.923761] RSP: 002b:00007fa63815d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1328.925281] RAX: ffffffffffffffda RBX: 00007fa63acfaf60 RCX: 00007fa63abe7b19 [ 1328.926235] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1328.927162] RBP: 00007fa63815d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1328.928088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1328.929087] R13: 00007fffdac8690f R14: 00007fa63815d300 R15: 0000000000022000 [ 1328.936113] FAULT_INJECTION: forcing a failure. [ 1328.936113] name failslab, interval 1, probability 0, space 0, times 0 [ 1328.937751] CPU: 1 PID: 8345 Comm: syz-executor.2 Not tainted 5.10.238 #1 [ 1328.938673] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1328.939744] Call Trace: [ 1328.940091] dump_stack+0x107/0x167 [ 1328.940568] should_fail.cold+0x5/0xa [ 1328.941174] ? getname_flags.part.0+0x50/0x4f0 [ 1328.941809] should_failslab+0x5/0x20 [ 1328.942303] kmem_cache_alloc+0x5b/0x310 [ 1328.942831] ? strncpy_from_user+0x9e/0x470 [ 1328.943398] getname_flags.part.0+0x50/0x4f0 [ 1328.943971] getname_flags+0x9a/0xe0 [ 1328.944487] __x64_sys_rename+0x65/0xa0 [ 1328.945370] do_syscall_64+0x33/0x40 [ 1328.946326] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1328.947676] RIP: 0033:0x7f5abea14b19 [ 1328.948629] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1328.951067] RSP: 002b:00007f5abbf8a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1328.952080] RAX: ffffffffffffffda RBX: 00007f5abeb27f60 RCX: 00007f5abea14b19 [ 1328.953523] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1328.955396] RBP: 00007f5abbf8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1328.957392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1328.958678] FAULT_INJECTION: forcing a failure. [ 1328.958678] name failslab, interval 1, probability 0, space 0, times 0 [ 1328.959280] R13: 00007ffe1e8b4a0f R14: 00007f5abbf8a300 R15: 0000000000022000 [ 1328.962089] CPU: 0 PID: 8333 Comm: syz-executor.1 Not tainted 5.10.238 #1 [ 1328.962431] FAULT_INJECTION: forcing a failure. [ 1328.962431] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1328.963047] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1328.963051] Call Trace: [ 1328.963064] dump_stack+0x107/0x167 [ 1328.963083] should_fail.cold+0x5/0xa [ 1328.967473] ? create_object.isra.0+0x3a/0xa20 [ 1328.968184] should_failslab+0x5/0x20 [ 1328.968792] kmem_cache_alloc+0x5b/0x310 [ 1328.969468] create_object.isra.0+0x3a/0xa20 [ 1328.970152] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1328.971004] kmem_cache_alloc+0x159/0x310 [ 1328.971659] ? strncpy_from_user+0x9e/0x470 [ 1328.972365] getname_flags.part.0+0x50/0x4f0 [ 1328.973055] getname_flags+0x9a/0xe0 [ 1328.973697] __x64_sys_rename+0x65/0xa0 [ 1328.974332] do_syscall_64+0x33/0x40 [ 1328.974910] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1328.975716] RIP: 0033:0x7f117e426b19 [ 1328.976333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1328.979187] RSP: 002b:00007f117b99c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1328.980428] RAX: ffffffffffffffda RBX: 00007f117e539f60 RCX: 00007f117e426b19 [ 1328.985567] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1328.986755] RBP: 00007f117b99c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1328.987955] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1328.989117] R13: 00007fff9db729bf R14: 00007f117b99c300 R15: 0000000000022000 [ 1328.990925] CPU: 1 PID: 8347 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1328.992010] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1328.993943] Call Trace: [ 1328.994672] dump_stack+0x107/0x167 [ 1328.995610] should_fail.cold+0x5/0xa [ 1328.996597] strncpy_from_user+0x34/0x470 [ 1328.997229] getname_flags.part.0+0x95/0x4f0 [ 1328.997834] getname_flags+0x9a/0xe0 [ 1328.998317] __x64_sys_rename+0x56/0xa0 [ 1328.998846] do_syscall_64+0x33/0x40 [ 1328.999332] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1328.999995] RIP: 0033:0x7f4eb49c4b19 [ 1329.000512] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.002948] RSP: 002b:00007f4eb1f3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1329.003933] RAX: ffffffffffffffda RBX: 00007f4eb4ad7f60 RCX: 00007f4eb49c4b19 [ 1329.005004] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1329.005966] RBP: 00007f4eb1f3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1329.006885] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1329.007807] R13: 00007ffdf23d638f R14: 00007f4eb1f3a300 R15: 0000000000022000 [ 1329.012301] FAULT_INJECTION: forcing a failure. [ 1329.012301] name failslab, interval 1, probability 0, space 0, times 0 [ 1329.013821] CPU: 1 PID: 8336 Comm: syz-executor.4 Not tainted 5.10.238 #1 [ 1329.014694] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1329.015790] Call Trace: [ 1329.016131] dump_stack+0x107/0x167 [ 1329.016610] should_fail.cold+0x5/0xa [ 1329.017139] ? getname_flags.part.0+0x50/0x4f0 [ 1329.017734] should_failslab+0x5/0x20 [ 1329.018229] kmem_cache_alloc+0x5b/0x310 [ 1329.018761] getname_flags.part.0+0x50/0x4f0 [ 1329.019356] getname_flags+0x9a/0xe0 [ 1329.019882] __x64_sys_rename+0x56/0xa0 [ 1329.020429] do_syscall_64+0x33/0x40 [ 1329.020963] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1329.021652] RIP: 0033:0x7ff983930b19 [ 1329.022170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.024649] RSP: 002b:00007ff980ea6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1329.025711] RAX: ffffffffffffffda RBX: 00007ff983a43f60 RCX: 00007ff983930b19 [ 1329.026672] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1329.027591] RBP: 00007ff980ea61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1329.028521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1329.029507] R13: 00007ffced023aaf R14: 00007ff980ea6300 R15: 0000000000022000 [ 1329.041687] FAULT_INJECTION: forcing a failure. [ 1329.041687] name failslab, interval 1, probability 0, space 0, times 0 [ 1329.043335] CPU: 0 PID: 8356 Comm: syz-executor.5 Not tainted 5.10.238 #1 [ 1329.044323] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1329.045469] Call Trace: [ 1329.045829] dump_stack+0x107/0x167 [ 1329.046342] should_fail.cold+0x5/0xa [ 1329.046896] ? getname_flags.part.0+0x50/0x4f0 [ 1329.047054] FAULT_INJECTION: forcing a failure. [ 1329.047054] name failslab, interval 1, probability 0, space 0, times 0 [ 1329.047585] should_failslab+0x5/0x20 [ 1329.049567] kmem_cache_alloc+0x5b/0x310 [ 1329.050123] ? strncpy_from_user+0x9e/0x470 [ 1329.050758] getname_flags.part.0+0x50/0x4f0 [ 1329.051360] getname_flags+0x9a/0xe0 [ 1329.051870] __x64_sys_rename+0x65/0xa0 [ 1329.052412] do_syscall_64+0x33/0x40 [ 1329.052940] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1329.053641] RIP: 0033:0x7fe0b67e3b19 [ 1329.054144] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.056684] RSP: 002b:00007fe0b3d38188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1329.057779] RAX: ffffffffffffffda RBX: 00007fe0b68f7020 RCX: 00007fe0b67e3b19 [ 1329.058752] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1329.059724] RBP: 00007fe0b3d381d0 R08: 0000000000000000 R09: 0000000000000000 [ 1329.060717] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1329.061752] R13: 00007ffc1e51636f R14: 00007fe0b3d38300 R15: 0000000000022000 [ 1329.062747] CPU: 1 PID: 8343 Comm: syz-executor.7 Not tainted 5.10.238 #1 [ 1329.063679] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1329.064823] Call Trace: [ 1329.065177] dump_stack+0x107/0x167 [ 1329.065656] should_fail.cold+0x5/0xa [ 1329.066159] ? getname_flags.part.0+0x50/0x4f0 [ 1329.066761] should_failslab+0x5/0x20 [ 1329.067263] kmem_cache_alloc+0x5b/0x310 [ 1329.067829] ? strncpy_from_user+0x9e/0x470 [ 1329.068394] getname_flags.part.0+0x50/0x4f0 [ 1329.069040] getname_flags+0x9a/0xe0 [ 1329.069531] __x64_sys_rename+0x65/0xa0 [ 1329.070055] do_syscall_64+0x33/0x40 [ 1329.070578] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1329.071241] RIP: 0033:0x7f7f35953b19 [ 1329.071770] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.074178] RSP: 002b:00007f7f32ec9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1329.075193] RAX: ffffffffffffffda RBX: 00007f7f35a66f60 RCX: 00007f7f35953b19 [ 1329.076166] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1329.077125] RBP: 00007f7f32ec91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1329.078082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1329.079055] R13: 00007ffc91ebe3df R14: 00007f7f32ec9300 R15: 0000000000022000 12:45:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 5) 12:45:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 6) 12:45:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 5) 12:45:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 2) 12:45:01 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 6) [ 1329.172176] loop3: detected capacity change from 0 to 41948160 12:45:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 5) 12:45:01 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 5) 12:45:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 4) [ 1329.278649] FAULT_INJECTION: forcing a failure. [ 1329.278649] name failslab, interval 1, probability 0, space 0, times 0 [ 1329.280356] CPU: 0 PID: 8369 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 1329.281334] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1329.282527] Call Trace: [ 1329.282931] dump_stack+0x107/0x167 [ 1329.283466] should_fail.cold+0x5/0xa [ 1329.284026] ? create_object.isra.0+0x3a/0xa20 [ 1329.284686] should_failslab+0x5/0x20 [ 1329.285256] kmem_cache_alloc+0x5b/0x310 [ 1329.285814] create_object.isra.0+0x3a/0xa20 [ 1329.286465] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1329.287165] kmem_cache_alloc+0x159/0x310 [ 1329.287737] ? strncpy_from_user+0x9e/0x470 [ 1329.288365] getname_flags.part.0+0x50/0x4f0 [ 1329.288987] getname_flags+0x9a/0xe0 [ 1329.289506] __x64_sys_rename+0x65/0xa0 [ 1329.290063] do_syscall_64+0x33/0x40 [ 1329.290576] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1329.291310] RIP: 0033:0x7f574a1c6b19 [ 1329.291817] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.298399] RSP: 002b:00007f574771b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1329.299491] RAX: ffffffffffffffda RBX: 00007f574a2da020 RCX: 00007f574a1c6b19 [ 1329.300472] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1329.301507] RBP: 00007f574771b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1329.302488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1329.303466] R13: 00007ffe8b5d839f R14: 00007f574771b300 R15: 0000000000022000 [ 1329.305967] loop1: detected capacity change from 0 to 41948160 [ 1329.314042] FAULT_INJECTION: forcing a failure. [ 1329.314042] name failslab, interval 1, probability 0, space 0, times 0 [ 1329.315650] CPU: 0 PID: 8368 Comm: syz-executor.4 Not tainted 5.10.238 #1 [ 1329.316587] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1329.317761] Call Trace: [ 1329.318167] dump_stack+0x107/0x167 [ 1329.318675] should_fail.cold+0x5/0xa [ 1329.319198] ? create_object.isra.0+0x3a/0xa20 [ 1329.319825] should_failslab+0x5/0x20 [ 1329.320348] kmem_cache_alloc+0x5b/0x310 [ 1329.324927] create_object.isra.0+0x3a/0xa20 [ 1329.325568] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1329.326268] kmem_cache_alloc+0x159/0x310 [ 1329.326845] getname_flags.part.0+0x50/0x4f0 [ 1329.327480] getname_flags+0x9a/0xe0 [ 1329.328009] __x64_sys_rename+0x56/0xa0 [ 1329.328589] do_syscall_64+0x33/0x40 [ 1329.329112] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1329.329816] RIP: 0033:0x7ff983930b19 [ 1329.330357] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.332954] RSP: 002b:00007ff980ea6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1329.334015] RAX: ffffffffffffffda RBX: 00007ff983a43f60 RCX: 00007ff983930b19 [ 1329.335020] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1329.335995] RBP: 00007ff980ea61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1329.337015] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1329.337999] R13: 00007ffced023aaf R14: 00007ff980ea6300 R15: 0000000000022000 [ 1329.338303] FAULT_INJECTION: forcing a failure. [ 1329.338303] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1329.340666] CPU: 1 PID: 8367 Comm: syz-executor.6 Not tainted 5.10.238 #1 [ 1329.341621] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1329.342698] Call Trace: [ 1329.343087] dump_stack+0x107/0x167 [ 1329.343560] should_fail.cold+0x5/0xa [ 1329.344089] strncpy_from_user+0x34/0x470 [ 1329.344657] getname_flags.part.0+0x95/0x4f0 [ 1329.345261] getname_flags+0x9a/0xe0 [ 1329.345750] __x64_sys_rename+0x65/0xa0 [ 1329.346301] do_syscall_64+0x33/0x40 [ 1329.346787] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1329.347496] RIP: 0033:0x7fa63abe7b19 [ 1329.347980] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.350356] RSP: 002b:00007fa63815d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1329.351328] RAX: ffffffffffffffda RBX: 00007fa63acfaf60 RCX: 00007fa63abe7b19 [ 1329.352279] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1329.353218] RBP: 00007fa63815d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1329.354141] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1329.355065] R13: 00007fffdac8690f R14: 00007fa63815d300 R15: 0000000000022000 [ 1329.380030] loop0: detected capacity change from 0 to 41948160 [ 1329.385294] FAULT_INJECTION: forcing a failure. [ 1329.385294] name failslab, interval 1, probability 0, space 0, times 0 [ 1329.386791] CPU: 1 PID: 8376 Comm: syz-executor.5 Not tainted 5.10.238 #1 [ 1329.387665] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1329.388749] Call Trace: [ 1329.389127] dump_stack+0x107/0x167 [ 1329.389627] should_fail.cold+0x5/0xa [ 1329.390153] ? create_object.isra.0+0x3a/0xa20 [ 1329.390777] should_failslab+0x5/0x20 [ 1329.391308] kmem_cache_alloc+0x5b/0x310 [ 1329.391841] create_object.isra.0+0x3a/0xa20 [ 1329.392458] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1329.393148] kmem_cache_alloc+0x159/0x310 [ 1329.393696] getname_flags.part.0+0x50/0x4f0 [ 1329.394302] getname_flags+0x9a/0xe0 [ 1329.394788] __x64_sys_rename+0x65/0xa0 [ 1329.395344] do_syscall_64+0x33/0x40 [ 1329.395833] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1329.396501] RIP: 0033:0x7fe0b67e3b19 [ 1329.397006] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.399402] RSP: 002b:00007fe0b3d38188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1329.400421] RAX: ffffffffffffffda RBX: 00007fe0b68f7020 RCX: 00007fe0b67e3b19 [ 1329.401356] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1329.402321] RBP: 00007fe0b3d381d0 R08: 0000000000000000 R09: 0000000000000000 [ 1329.403244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1329.404164] R13: 00007ffc1e51636f R14: 00007fe0b3d38300 R15: 0000000000022000 12:45:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 3) [ 1329.412305] FAULT_INJECTION: forcing a failure. [ 1329.412305] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1329.413840] CPU: 1 PID: 8374 Comm: syz-executor.1 Not tainted 5.10.238 #1 [ 1329.414749] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1329.415867] Call Trace: [ 1329.416240] dump_stack+0x107/0x167 [ 1329.416759] should_fail.cold+0x5/0xa [ 1329.417339] strncpy_from_user+0x34/0x470 [ 1329.417911] getname_flags.part.0+0x95/0x4f0 [ 1329.418539] getname_flags+0x9a/0xe0 [ 1329.419028] __x64_sys_rename+0x65/0xa0 [ 1329.419548] do_syscall_64+0x33/0x40 [ 1329.420038] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1329.420723] RIP: 0033:0x7f117e426b19 [ 1329.421308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.423705] RSP: 002b:00007f117b97b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1329.424741] RAX: ffffffffffffffda RBX: 00007f117e53a020 RCX: 00007f117e426b19 [ 1329.425673] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1329.426625] RBP: 00007f117b97b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1329.427591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1329.428518] R13: 00007fff9db729bf R14: 00007f117b97b300 R15: 0000000000022000 [ 1329.431025] FAULT_INJECTION: forcing a failure. [ 1329.431025] name failslab, interval 1, probability 0, space 0, times 0 [ 1329.432641] CPU: 1 PID: 8378 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1329.433576] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1329.434683] Call Trace: [ 1329.435030] dump_stack+0x107/0x167 [ 1329.435506] should_fail.cold+0x5/0xa [ 1329.436004] ? getname_flags.part.0+0x50/0x4f0 [ 1329.436630] should_failslab+0x5/0x20 [ 1329.437151] kmem_cache_alloc+0x5b/0x310 [ 1329.437725] ? strncpy_from_user+0x9e/0x470 [ 1329.438289] getname_flags.part.0+0x50/0x4f0 [ 1329.438864] getname_flags+0x9a/0xe0 [ 1329.439382] __x64_sys_rename+0x65/0xa0 [ 1329.439899] do_syscall_64+0x33/0x40 [ 1329.440430] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1329.441117] RIP: 0033:0x7f4eb49c4b19 [ 1329.441607] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.444012] RSP: 002b:00007f4eb1f19188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1329.445017] RAX: ffffffffffffffda RBX: 00007f4eb4ad8020 RCX: 00007f4eb49c4b19 [ 1329.445964] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1329.446932] RBP: 00007f4eb1f191d0 R08: 0000000000000000 R09: 0000000000000000 [ 1329.447858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1329.448797] R13: 00007ffdf23d638f R14: 00007f4eb1f19300 R15: 0000000000022000 12:45:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 6) 12:45:01 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 7) [ 1329.471464] loop7: detected capacity change from 0 to 41948160 [ 1329.477443] loop2: detected capacity change from 0 to 41948160 [ 1329.503952] FAULT_INJECTION: forcing a failure. [ 1329.503952] name failslab, interval 1, probability 0, space 0, times 0 [ 1329.505599] CPU: 0 PID: 8381 Comm: syz-executor.2 Not tainted 5.10.238 #1 [ 1329.506534] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1329.507668] Call Trace: [ 1329.508035] dump_stack+0x107/0x167 [ 1329.508537] should_fail.cold+0x5/0xa [ 1329.509001] FAULT_INJECTION: forcing a failure. [ 1329.509001] name failslab, interval 1, probability 0, space 0, times 0 [ 1329.509086] ? create_object.isra.0+0x3a/0xa20 [ 1329.511219] should_failslab+0x5/0x20 [ 1329.511747] kmem_cache_alloc+0x5b/0x310 [ 1329.512330] create_object.isra.0+0x3a/0xa20 [ 1329.512957] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1329.513697] kmem_cache_alloc+0x159/0x310 [ 1329.514267] ? strncpy_from_user+0x9e/0x470 [ 1329.514863] getname_flags.part.0+0x50/0x4f0 [ 1329.515498] getname_flags+0x9a/0xe0 [ 1329.516006] __x64_sys_rename+0x65/0xa0 [ 1329.516597] do_syscall_64+0x33/0x40 [ 1329.517125] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1329.517827] RIP: 0033:0x7f5abea14b19 [ 1329.518368] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.520934] RSP: 002b:00007f5abbf8a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1329.522006] RAX: ffffffffffffffda RBX: 00007f5abeb27f60 RCX: 00007f5abea14b19 [ 1329.523018] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1329.523995] RBP: 00007f5abbf8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1329.529017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1329.530030] R13: 00007ffe1e8b4a0f R14: 00007f5abbf8a300 R15: 0000000000022000 [ 1329.531033] CPU: 1 PID: 8386 Comm: syz-executor.7 Not tainted 5.10.238 #1 [ 1329.531982] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1329.533095] Call Trace: [ 1329.533449] dump_stack+0x107/0x167 [ 1329.533917] should_fail.cold+0x5/0xa [ 1329.534439] ? getname_flags.part.0+0x50/0x4f0 [ 1329.535019] should_failslab+0x5/0x20 [ 1329.535545] kmem_cache_alloc+0x5b/0x310 [ 1329.536067] ? strncpy_from_user+0x9e/0x470 [ 1329.536619] getname_flags.part.0+0x50/0x4f0 [ 1329.537201] getname_flags+0x9a/0xe0 [ 1329.537709] __x64_sys_rename+0x65/0xa0 [ 1329.538213] do_syscall_64+0x33/0x40 [ 1329.538740] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1329.539400] RIP: 0033:0x7f7f35953b19 [ 1329.539887] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.542300] RSP: 002b:00007f7f32ea8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1329.543265] RAX: ffffffffffffffda RBX: 00007f7f35a67020 RCX: 00007f7f35953b19 [ 1329.544193] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1329.545157] RBP: 00007f7f32ea81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1329.546061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1329.546987] R13: 00007ffc91ebe3df R14: 00007f7f32ea8300 R15: 0000000000022000 [ 1329.551570] loop4: detected capacity change from 0 to 41948160 [ 1329.572708] FAULT_INJECTION: forcing a failure. [ 1329.572708] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1329.574386] CPU: 1 PID: 8384 Comm: syz-executor.4 Not tainted 5.10.238 #1 [ 1329.575264] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1329.576356] Call Trace: [ 1329.576702] dump_stack+0x107/0x167 [ 1329.577189] should_fail.cold+0x5/0xa [ 1329.577714] strncpy_from_user+0x34/0x470 [ 1329.578242] getname_flags.part.0+0x95/0x4f0 [ 1329.578849] getname_flags+0x9a/0xe0 [ 1329.579322] __x64_sys_rename+0x56/0xa0 [ 1329.579831] do_syscall_64+0x33/0x40 [ 1329.580305] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1329.580983] RIP: 0033:0x7ff983930b19 [ 1329.581462] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.583837] RSP: 002b:00007ff980ea6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1329.584859] RAX: ffffffffffffffda RBX: 00007ff983a43f60 RCX: 00007ff983930b19 [ 1329.585760] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1329.586698] RBP: 00007ff980ea61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1329.587637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1329.588545] R13: 00007ffced023aaf R14: 00007ff980ea6300 R15: 0000000000022000 [ 1329.599758] loop3: detected capacity change from 0 to 41948160 [ 1329.634442] FAULT_INJECTION: forcing a failure. [ 1329.634442] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1329.636191] CPU: 1 PID: 8389 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 1329.637103] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1329.638203] Call Trace: [ 1329.638549] dump_stack+0x107/0x167 [ 1329.639033] should_fail.cold+0x5/0xa [ 1329.639589] strncpy_from_user+0x34/0x470 [ 1329.640158] getname_flags.part.0+0x95/0x4f0 [ 1329.640797] getname_flags+0x9a/0xe0 [ 1329.641317] __x64_sys_rename+0x65/0xa0 [ 1329.641862] do_syscall_64+0x33/0x40 [ 1329.642377] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1329.643090] RIP: 0033:0x7f574a1c6b19 [ 1329.643613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.646079] RSP: 002b:00007f574773c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1329.647127] RAX: ffffffffffffffda RBX: 00007f574a2d9f60 RCX: 00007f574a1c6b19 [ 1329.648061] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1329.649022] RBP: 00007f574773c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1329.649986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1329.650893] R13: 00007ffe8b5d839f R14: 00007f574773c300 R15: 0000000000022000 [ 1329.657976] loop6: detected capacity change from 0 to 41948160 [ 1329.672296] FAULT_INJECTION: forcing a failure. [ 1329.672296] name failslab, interval 1, probability 0, space 0, times 0 [ 1329.674245] CPU: 0 PID: 8392 Comm: syz-executor.6 Not tainted 5.10.238 #1 [ 1329.675255] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1329.676413] Call Trace: [ 1329.676836] dump_stack+0x107/0x167 [ 1329.677372] should_fail.cold+0x5/0xa [ 1329.677971] ? __d_alloc+0x2a/0x990 [ 1329.678507] should_failslab+0x5/0x20 [ 1329.679061] kmem_cache_alloc+0x5b/0x310 [ 1329.679685] __d_alloc+0x2a/0x990 [ 1329.680182] ? dput+0x1ae/0xcd0 [ 1329.680681] d_alloc+0x46/0x1c0 [ 1329.681207] __lookup_hash+0xcc/0x190 [ 1329.681765] do_renameat2+0x51f/0xbf0 [ 1329.682327] ? __ia32_sys_link+0x80/0x80 [ 1329.682934] ? __virt_addr_valid+0x170/0x5d0 [ 1329.683537] ? __check_object_size+0x319/0x440 [ 1329.684209] ? getname_flags.part.0+0x1dd/0x4f0 [ 1329.684869] __x64_sys_rename+0x7d/0xa0 [ 1329.685416] do_syscall_64+0x33/0x40 [ 1329.685959] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1329.686664] RIP: 0033:0x7fa63abe7b19 [ 1329.687208] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.689765] RSP: 002b:00007fa63815d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1329.690812] RAX: ffffffffffffffda RBX: 00007fa63acfaf60 RCX: 00007fa63abe7b19 [ 1329.691820] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1329.692837] RBP: 00007fa63815d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1329.693818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1329.694798] R13: 00007fffdac8690f R14: 00007fa63815d300 R15: 0000000000022000 12:45:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 6) 12:45:16 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 8) [ 1344.050277] loop6: detected capacity change from 0 to 41948160 12:45:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 7) 12:45:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 6) 12:45:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 7) 12:45:16 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 5) 12:45:16 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 6) 12:45:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 4) [ 1344.059026] loop3: detected capacity change from 0 to 41948160 [ 1344.064520] loop0: detected capacity change from 0 to 41948160 [ 1344.068122] loop4: detected capacity change from 0 to 41948160 [ 1344.077243] loop2: detected capacity change from 0 to 41948160 [ 1344.080522] loop5: detected capacity change from 0 to 41948160 [ 1344.083592] loop7: detected capacity change from 0 to 41948160 [ 1344.095672] loop1: detected capacity change from 0 to 41948160 [ 1344.113117] FAULT_INJECTION: forcing a failure. [ 1344.113117] name failslab, interval 1, probability 0, space 0, times 0 [ 1344.116317] CPU: 1 PID: 8414 Comm: syz-executor.4 Not tainted 5.10.238 #1 [ 1344.117066] FAULT_INJECTION: forcing a failure. [ 1344.117066] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1344.118258] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1344.118263] Call Trace: [ 1344.118282] dump_stack+0x107/0x167 [ 1344.118299] should_fail.cold+0x5/0xa [ 1344.125996] ? getname_flags.part.0+0x50/0x4f0 [ 1344.127186] should_failslab+0x5/0x20 [ 1344.128144] kmem_cache_alloc+0x5b/0x310 [ 1344.129241] ? strncpy_from_user+0x9e/0x470 [ 1344.130330] getname_flags.part.0+0x50/0x4f0 [ 1344.131438] getname_flags+0x9a/0xe0 [ 1344.132403] __x64_sys_rename+0x65/0xa0 [ 1344.133538] do_syscall_64+0x33/0x40 [ 1344.134491] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1344.135798] RIP: 0033:0x7ff983930b19 [ 1344.136728] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1344.139258] RSP: 002b:00007ff980ea6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1344.140233] RAX: ffffffffffffffda RBX: 00007ff983a43f60 RCX: 00007ff983930b19 [ 1344.141199] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1344.142113] RBP: 00007ff980ea61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1344.143026] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1344.143972] R13: 00007ffced023aaf R14: 00007ff980ea6300 R15: 0000000000022000 [ 1344.144918] CPU: 0 PID: 8417 Comm: syz-executor.7 Not tainted 5.10.238 #1 [ 1344.145904] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1344.147045] Call Trace: [ 1344.147415] dump_stack+0x107/0x167 [ 1344.147927] should_fail.cold+0x5/0xa [ 1344.148458] strncpy_from_user+0x34/0x470 [ 1344.149045] getname_flags.part.0+0x95/0x4f0 [ 1344.149649] getname_flags+0x9a/0xe0 [ 1344.150194] __x64_sys_rename+0x65/0xa0 [ 1344.150738] do_syscall_64+0x33/0x40 [ 1344.151295] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1344.151995] RIP: 0033:0x7f7f35953b19 [ 1344.152504] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1344.155027] RSP: 002b:00007f7f32ec9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1344.156093] RAX: ffffffffffffffda RBX: 00007f7f35a66f60 RCX: 00007f7f35953b19 [ 1344.156489] FAULT_INJECTION: forcing a failure. [ 1344.156489] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1344.157118] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1344.157127] RBP: 00007f7f32ec91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1344.157141] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1344.161509] R13: 00007ffc91ebe3df R14: 00007f7f32ec9300 R15: 0000000000022000 [ 1344.162536] CPU: 1 PID: 8426 Comm: syz-executor.5 Not tainted 5.10.238 #1 [ 1344.163463] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1344.164521] Call Trace: [ 1344.164864] dump_stack+0x107/0x167 [ 1344.165349] should_fail.cold+0x5/0xa [ 1344.165845] strncpy_from_user+0x34/0x470 [ 1344.166382] getname_flags.part.0+0x95/0x4f0 [ 1344.166952] getname_flags+0x9a/0xe0 [ 1344.167429] __x64_sys_rename+0x65/0xa0 [ 1344.167948] do_syscall_64+0x33/0x40 [ 1344.168464] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1344.169160] RIP: 0033:0x7fe0b67e3b19 [ 1344.169638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1344.171992] RSP: 002b:00007fe0b3d38188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1344.173013] RAX: ffffffffffffffda RBX: 00007fe0b68f7020 RCX: 00007fe0b67e3b19 [ 1344.173926] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1344.174882] RBP: 00007fe0b3d381d0 R08: 0000000000000000 R09: 0000000000000000 [ 1344.175796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1344.176709] R13: 00007ffc1e51636f R14: 00007fe0b3d38300 R15: 0000000000022000 [ 1344.179122] FAULT_INJECTION: forcing a failure. [ 1344.179122] name failslab, interval 1, probability 0, space 0, times 0 [ 1344.180651] CPU: 1 PID: 8406 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 1344.181539] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1344.182597] Call Trace: [ 1344.182938] dump_stack+0x107/0x167 [ 1344.183431] should_fail.cold+0x5/0xa [ 1344.183937] ? __d_alloc+0x2a/0x990 [ 1344.184439] should_failslab+0x5/0x20 [ 1344.184996] kmem_cache_alloc+0x5b/0x310 [ 1344.185551] __d_alloc+0x2a/0x990 [ 1344.186026] ? dput+0x1ae/0xcd0 [ 1344.186515] d_alloc+0x46/0x1c0 [ 1344.186972] __lookup_hash+0xcc/0x190 [ 1344.187496] do_renameat2+0x51f/0xbf0 [ 1344.188025] ? __ia32_sys_link+0x80/0x80 [ 1344.188563] ? __virt_addr_valid+0x170/0x5d0 [ 1344.189146] ? __check_object_size+0x319/0x440 [ 1344.189747] ? getname_flags.part.0+0x1dd/0x4f0 [ 1344.190355] __x64_sys_rename+0x7d/0xa0 [ 1344.190868] do_syscall_64+0x33/0x40 [ 1344.191373] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1344.192049] RIP: 0033:0x7f574a1c6b19 [ 1344.192552] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1344.194920] RSP: 002b:00007f574773c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1344.195899] RAX: ffffffffffffffda RBX: 00007f574a2d9f60 RCX: 00007f574a1c6b19 [ 1344.196815] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1344.197764] RBP: 00007f574773c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1344.198722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1344.199637] R13: 00007ffe8b5d839f R14: 00007f574773c300 R15: 0000000000022000 [ 1344.204552] FAULT_INJECTION: forcing a failure. [ 1344.204552] name failslab, interval 1, probability 0, space 0, times 0 [ 1344.205639] FAULT_INJECTION: forcing a failure. [ 1344.205639] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1344.206083] CPU: 1 PID: 8402 Comm: syz-executor.6 Not tainted 5.10.238 #1 [ 1344.208515] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1344.209626] Call Trace: [ 1344.209966] dump_stack+0x107/0x167 [ 1344.210483] should_fail.cold+0x5/0xa [ 1344.210975] ? create_object.isra.0+0x3a/0xa20 [ 1344.211565] should_failslab+0x5/0x20 [ 1344.212055] kmem_cache_alloc+0x5b/0x310 [ 1344.212583] create_object.isra.0+0x3a/0xa20 [ 1344.213168] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1344.213825] kmem_cache_alloc+0x159/0x310 [ 1344.214363] __d_alloc+0x2a/0x990 [ 1344.214807] ? dput+0x1ae/0xcd0 [ 1344.215265] d_alloc+0x46/0x1c0 [ 1344.215688] __lookup_hash+0xcc/0x190 [ 1344.216224] do_renameat2+0x51f/0xbf0 [ 1344.216720] ? __ia32_sys_link+0x80/0x80 [ 1344.217267] ? __virt_addr_valid+0x170/0x5d0 [ 1344.217834] ? __check_object_size+0x319/0x440 [ 1344.218431] ? getname_flags.part.0+0x1dd/0x4f0 [ 1344.219037] __x64_sys_rename+0x7d/0xa0 [ 1344.219548] do_syscall_64+0x33/0x40 [ 1344.220055] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1344.220714] RIP: 0033:0x7fa63abe7b19 [ 1344.221254] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1344.223616] RSP: 002b:00007fa63815d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1344.224601] RAX: ffffffffffffffda RBX: 00007fa63acfaf60 RCX: 00007fa63abe7b19 [ 1344.225530] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1344.226446] RBP: 00007fa63815d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1344.227404] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1344.228319] R13: 00007fffdac8690f R14: 00007fa63815d300 R15: 0000000000022000 [ 1344.229274] CPU: 0 PID: 8407 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1344.230228] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1344.231366] Call Trace: [ 1344.231733] dump_stack+0x107/0x167 [ 1344.232260] should_fail.cold+0x5/0xa [ 1344.232785] __alloc_pages_nodemask+0x182/0x600 [ 1344.233486] ? __alloc_pages_slowpath.constprop.0+0x2200/0x2200 [ 1344.234320] ? kmem_cache_alloc+0x301/0x310 [ 1344.234915] alloc_pages_current+0x187/0x280 [ 1344.235523] allocate_slab+0x26f/0x380 [ 1344.236061] ___slab_alloc+0x470/0x700 [ 1344.236597] ? getname_flags.part.0+0x50/0x4f0 [ 1344.237247] ? __virt_addr_valid+0x170/0x5d0 [ 1344.237851] ? getname_flags.part.0+0x50/0x4f0 [ 1344.238508] ? kmem_cache_alloc+0x301/0x310 [ 1344.239094] ? getname_flags.part.0+0x50/0x4f0 [ 1344.239725] kmem_cache_alloc+0x301/0x310 [ 1344.240296] getname_flags.part.0+0x50/0x4f0 [ 1344.240908] getname_flags+0x9a/0xe0 [ 1344.241430] __x64_sys_rename+0x65/0xa0 [ 1344.241978] do_syscall_64+0x33/0x40 [ 1344.242489] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1344.243222] RIP: 0033:0x7f4eb49c4b19 [ 1344.243728] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1344.246264] RSP: 002b:00007f4eb1f3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1344.247306] RAX: ffffffffffffffda RBX: 00007f4eb4ad7f60 RCX: 00007f4eb49c4b19 [ 1344.248282] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1344.249307] RBP: 00007f4eb1f3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1344.250324] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1344.251306] R13: 00007ffdf23d638f R14: 00007f4eb1f3a300 R15: 0000000000022000 [ 1344.262768] FAULT_INJECTION: forcing a failure. [ 1344.262768] name failslab, interval 1, probability 0, space 0, times 0 [ 1344.264341] CPU: 0 PID: 8416 Comm: syz-executor.1 Not tainted 5.10.238 #1 [ 1344.265291] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1344.266459] Call Trace: [ 1344.266819] dump_stack+0x107/0x167 [ 1344.267364] should_fail.cold+0x5/0xa [ 1344.267889] ? __d_alloc+0x2a/0x990 [ 1344.268391] should_failslab+0x5/0x20 [ 1344.268924] kmem_cache_alloc+0x5b/0x310 [ 1344.269493] __d_alloc+0x2a/0x990 [ 1344.269970] ? dput+0x1ae/0xcd0 [ 1344.270428] d_alloc+0x46/0x1c0 [ 1344.270885] __lookup_hash+0xcc/0x190 [ 1344.271411] do_renameat2+0x51f/0xbf0 [ 1344.271943] ? __ia32_sys_link+0x80/0x80 [ 1344.272538] ? __virt_addr_valid+0x170/0x5d0 [ 1344.273164] ? __check_object_size+0x319/0x440 [ 1344.273837] ? getname_flags.part.0+0x1dd/0x4f0 [ 1344.274485] __x64_sys_rename+0x7d/0xa0 [ 1344.275034] do_syscall_64+0x33/0x40 [ 1344.275547] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1344.276250] RIP: 0033:0x7f117e426b19 [ 1344.276762] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1344.279379] RSP: 002b:00007f117b99c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1344.280423] RAX: ffffffffffffffda RBX: 00007f117e539f60 RCX: 00007f117e426b19 [ 1344.281415] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1344.282393] RBP: 00007f117b99c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1344.283396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1344.284408] R13: 00007fff9db729bf R14: 00007f117b99c300 R15: 0000000000022000 [ 1344.298243] FAULT_INJECTION: forcing a failure. [ 1344.298243] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1344.299923] CPU: 0 PID: 8415 Comm: syz-executor.2 Not tainted 5.10.238 #1 [ 1344.300888] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1344.302087] Call Trace: [ 1344.302522] dump_stack+0x107/0x167 [ 1344.303055] should_fail.cold+0x5/0xa [ 1344.303617] strncpy_from_user+0x34/0x470 [ 1344.304223] getname_flags.part.0+0x95/0x4f0 [ 1344.304863] getname_flags+0x9a/0xe0 [ 1344.305425] __x64_sys_rename+0x65/0xa0 [ 1344.306001] do_syscall_64+0x33/0x40 [ 1344.306577] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1344.307330] RIP: 0033:0x7f5abea14b19 [ 1344.307861] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1344.310388] RSP: 002b:00007f5abbf8a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1344.311432] RAX: ffffffffffffffda RBX: 00007f5abeb27f60 RCX: 00007f5abea14b19 [ 1344.312438] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1344.313468] RBP: 00007f5abbf8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1344.314447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1344.315424] R13: 00007ffe1e8b4a0f R14: 00007f5abbf8a300 R15: 0000000000022000 12:45:16 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 9) 12:45:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 8) 12:45:16 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 7) 12:45:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 7) [ 1344.391752] FAULT_INJECTION: forcing a failure. [ 1344.391752] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1344.393649] CPU: 1 PID: 8431 Comm: syz-executor.6 Not tainted 5.10.238 #1 [ 1344.394537] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1344.395608] Call Trace: [ 1344.395971] dump_stack+0x107/0x167 [ 1344.396455] should_fail.cold+0x5/0xa [ 1344.396969] _copy_to_user+0x2e/0x180 [ 1344.397509] simple_read_from_buffer+0xcc/0x160 [ 1344.398112] proc_fail_nth_read+0x198/0x230 [ 1344.398718] ? proc_sessionid_read+0x230/0x230 [ 1344.399309] ? security_file_permission+0xb1/0xe0 [ 1344.399952] ? proc_sessionid_read+0x230/0x230 [ 1344.400565] vfs_read+0x228/0x620 [ 1344.401061] ksys_read+0x12d/0x260 [ 1344.401538] ? vfs_write+0xb10/0xb10 [ 1344.402047] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1344.402743] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1344.403428] do_syscall_64+0x33/0x40 [ 1344.403921] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1344.404619] RIP: 0033:0x7fa63ab9a69c [ 1344.405122] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1344.407486] RSP: 002b:00007fa63815d170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1344.408477] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa63ab9a69c [ 1344.409439] RDX: 000000000000000f RSI: 00007fa63815d1e0 RDI: 0000000000000003 [ 1344.410352] RBP: 00007fa63815d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1344.411313] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1344.412227] R13: 00007fffdac8690f R14: 00007fa63815d300 R15: 0000000000022000 [ 1344.416996] loop7: detected capacity change from 0 to 41948160 [ 1344.436818] FAULT_INJECTION: forcing a failure. [ 1344.436818] name failslab, interval 1, probability 0, space 0, times 0 [ 1344.438320] CPU: 1 PID: 8432 Comm: syz-executor.7 Not tainted 5.10.238 #1 [ 1344.439203] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1344.440267] Call Trace: [ 1344.440614] dump_stack+0x107/0x167 [ 1344.441106] should_fail.cold+0x5/0xa [ 1344.441634] ? __d_alloc+0x2a/0x990 [ 1344.442102] should_failslab+0x5/0x20 [ 1344.442636] kmem_cache_alloc+0x5b/0x310 [ 1344.443168] __d_alloc+0x2a/0x990 [ 1344.443612] ? dput+0x1ae/0xcd0 [ 1344.444044] d_alloc+0x46/0x1c0 [ 1344.444300] loop3: detected capacity change from 0 to 41948160 [ 1344.444473] __lookup_hash+0xcc/0x190 [ 1344.445825] do_renameat2+0x51f/0xbf0 [ 1344.446326] ? __ia32_sys_link+0x80/0x80 [ 1344.446869] ? __virt_addr_valid+0x170/0x5d0 [ 1344.447462] ? __check_object_size+0x319/0x440 [ 1344.448086] ? getname_flags.part.0+0x1dd/0x4f0 [ 1344.448735] __x64_sys_rename+0x7d/0xa0 [ 1344.449281] do_syscall_64+0x33/0x40 [ 1344.449768] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1344.450426] RIP: 0033:0x7f7f35953b19 [ 1344.450911] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1344.453318] RSP: 002b:00007f7f32ec9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1344.454345] RAX: ffffffffffffffda RBX: 00007f7f35a66f60 RCX: 00007f7f35953b19 [ 1344.455262] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1344.456183] RBP: 00007f7f32ec91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1344.457119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1344.458035] R13: 00007ffc91ebe3df R14: 00007f7f32ec9300 R15: 0000000000022000 [ 1344.472156] loop2: detected capacity change from 0 to 41948160 [ 1344.483271] FAULT_INJECTION: forcing a failure. [ 1344.483271] name failslab, interval 1, probability 0, space 0, times 0 [ 1344.484856] CPU: 0 PID: 8435 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 1344.485835] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1344.487004] Call Trace: [ 1344.487373] dump_stack+0x107/0x167 [ 1344.487876] should_fail.cold+0x5/0xa [ 1344.488403] ? create_object.isra.0+0x3a/0xa20 [ 1344.489047] should_failslab+0x5/0x20 [ 1344.489571] kmem_cache_alloc+0x5b/0x310 [ 1344.490133] create_object.isra.0+0x3a/0xa20 [ 1344.490770] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1344.491463] kmem_cache_alloc+0x159/0x310 [ 1344.492046] __d_alloc+0x2a/0x990 [ 1344.492519] ? dput+0x1ae/0xcd0 [ 1344.492993] d_alloc+0x46/0x1c0 [ 1344.493449] __lookup_hash+0xcc/0x190 [ 1344.493975] do_renameat2+0x51f/0xbf0 [ 1344.494505] ? __ia32_sys_link+0x80/0x80 [ 1344.495072] ? __virt_addr_valid+0x170/0x5d0 [ 1344.495679] ? __check_object_size+0x319/0x440 [ 1344.496312] ? getname_flags.part.0+0x1dd/0x4f0 [ 1344.497014] __x64_sys_rename+0x7d/0xa0 [ 1344.497562] do_syscall_64+0x33/0x40 [ 1344.498079] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1344.498781] RIP: 0033:0x7f574a1c6b19 [ 1344.499290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1344.501851] RSP: 002b:00007f574773c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1344.502933] RAX: ffffffffffffffda RBX: 00007f574a2d9f60 RCX: 00007f574a1c6b19 [ 1344.503910] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1344.504886] RBP: 00007f574773c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1344.505875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1344.506853] R13: 00007ffe8b5d839f R14: 00007f574773c300 R15: 0000000000022000 [ 1344.523908] FAULT_INJECTION: forcing a failure. [ 1344.523908] name failslab, interval 1, probability 0, space 0, times 0 [ 1344.525512] CPU: 0 PID: 8438 Comm: syz-executor.2 Not tainted 5.10.238 #1 [ 1344.526447] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1344.527579] Call Trace: [ 1344.527941] dump_stack+0x107/0x167 [ 1344.528449] should_fail.cold+0x5/0xa [ 1344.528988] ? __d_alloc+0x2a/0x990 [ 1344.529487] should_failslab+0x5/0x20 [ 1344.530055] kmem_cache_alloc+0x5b/0x310 [ 1344.530619] __d_alloc+0x2a/0x990 [ 1344.531092] ? dput+0x1ae/0xcd0 [ 1344.531550] d_alloc+0x46/0x1c0 [ 1344.532006] __lookup_hash+0xcc/0x190 [ 1344.532532] do_renameat2+0x51f/0xbf0 [ 1344.533071] ? __ia32_sys_link+0x80/0x80 [ 1344.533634] ? __virt_addr_valid+0x170/0x5d0 [ 1344.534237] ? __check_object_size+0x319/0x440 [ 1344.534895] ? getname_flags.part.0+0x1dd/0x4f0 [ 1344.535534] __x64_sys_rename+0x7d/0xa0 [ 1344.536140] do_syscall_64+0x33/0x40 [ 1344.536649] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1344.537367] RIP: 0033:0x7f5abea14b19 [ 1344.537878] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1344.540433] RSP: 002b:00007f5abbf8a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1344.541507] RAX: ffffffffffffffda RBX: 00007f5abeb27f60 RCX: 00007f5abea14b19 [ 1344.542487] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1344.543466] RBP: 00007f5abbf8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1344.544444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1344.545463] R13: 00007ffe1e8b4a0f R14: 00007f5abbf8a300 R15: 0000000000022000 12:45:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 5) 12:45:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 8) 12:45:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 9) 12:45:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 6) 12:45:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 7) 12:45:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 8) 12:45:31 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:45:31 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 8) [ 1358.884090] loop1: detected capacity change from 0 to 41948160 [ 1358.888497] loop6: detected capacity change from 0 to 41948160 [ 1358.922456] loop2: detected capacity change from 0 to 41948160 [ 1358.931343] loop3: detected capacity change from 0 to 41948160 [ 1358.941566] loop7: detected capacity change from 0 to 41948160 [ 1358.961453] FAULT_INJECTION: forcing a failure. [ 1358.961453] name failslab, interval 1, probability 0, space 0, times 0 [ 1358.962989] CPU: 1 PID: 8458 Comm: syz-executor.7 Not tainted 5.10.238 #1 [ 1358.963863] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1358.964915] Call Trace: [ 1358.965279] dump_stack+0x107/0x167 [ 1358.965314] loop4: detected capacity change from 0 to 41948160 [ 1358.965734] should_fail.cold+0x5/0xa [ 1358.965751] ? create_object.isra.0+0x3a/0xa20 [ 1358.965776] should_failslab+0x5/0x20 [ 1358.968100] kmem_cache_alloc+0x5b/0x310 [ 1358.968623] create_object.isra.0+0x3a/0xa20 [ 1358.969194] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1358.969873] kmem_cache_alloc+0x159/0x310 [ 1358.970408] __d_alloc+0x2a/0x990 [ 1358.970853] ? dput+0x1ae/0xcd0 [ 1358.971314] d_alloc+0x46/0x1c0 [ 1358.971738] __lookup_hash+0xcc/0x190 [ 1358.972227] do_renameat2+0x51f/0xbf0 [ 1358.972719] ? __ia32_sys_link+0x80/0x80 [ 1358.973259] ? __virt_addr_valid+0x170/0x5d0 [ 1358.973865] ? __check_object_size+0x319/0x440 [ 1358.974479] ? getname_flags.part.0+0x1dd/0x4f0 [ 1358.975129] __x64_sys_rename+0x7d/0xa0 [ 1358.975655] do_syscall_64+0x33/0x40 [ 1358.976151] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1358.976815] RIP: 0033:0x7f7f35953b19 [ 1358.977402] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1358.977873] FAULT_INJECTION: forcing a failure. [ 1358.977873] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1358.979660] RSP: 002b:00007f7f32ec9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1358.979676] RAX: ffffffffffffffda RBX: 00007f7f35a66f60 RCX: 00007f7f35953b19 [ 1358.979688] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1358.986814] RBP: 00007f7f32ec91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1358.988594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1358.990548] R13: 00007ffc91ebe3df R14: 00007f7f32ec9300 R15: 0000000000022000 [ 1358.992360] CPU: 0 PID: 8474 Comm: syz-executor.3 Not tainted 5.10.238 #1 [ 1358.993425] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1358.994573] Call Trace: [ 1358.994955] dump_stack+0x107/0x167 [ 1358.995497] should_fail.cold+0x5/0xa [ 1358.996038] _copy_to_user+0x2e/0x180 [ 1358.996584] simple_read_from_buffer+0xcc/0x160 [ 1358.997257] proc_fail_nth_read+0x198/0x230 [ 1358.997887] ? proc_sessionid_read+0x230/0x230 [ 1358.998239] FAULT_INJECTION: forcing a failure. [ 1358.998239] name failslab, interval 1, probability 0, space 0, times 0 [ 1358.998518] ? security_file_permission+0xb1/0xe0 [ 1358.998535] ? proc_sessionid_read+0x230/0x230 [ 1358.998552] vfs_read+0x228/0x620 [ 1358.998572] ksys_read+0x12d/0x260 [ 1359.002169] ? vfs_write+0xb10/0xb10 [ 1359.002660] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1359.003390] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1359.004069] do_syscall_64+0x33/0x40 [ 1359.004559] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1359.006041] RIP: 0033:0x7f574a17969c [ 1359.006544] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1359.009120] RSP: 002b:00007f574771b170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1359.010191] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f574a17969c [ 1359.011160] RDX: 000000000000000f RSI: 00007f574771b1e0 RDI: 0000000000000005 [ 1359.012129] RBP: 00007f574771b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1359.017162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1359.018178] R13: 00007ffe8b5d839f R14: 00007f574771b300 R15: 0000000000022000 [ 1359.019201] CPU: 1 PID: 8476 Comm: syz-executor.1 Not tainted 5.10.238 #1 [ 1359.020073] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1359.021133] Call Trace: [ 1359.021474] dump_stack+0x107/0x167 [ 1359.021939] should_fail.cold+0x5/0xa [ 1359.022434] ? create_object.isra.0+0x3a/0xa20 [ 1359.023020] should_failslab+0x5/0x20 [ 1359.023506] kmem_cache_alloc+0x5b/0x310 [ 1359.024026] ? __ext4_find_entry+0x9f1/0xfc0 [ 1359.024591] create_object.isra.0+0x3a/0xa20 [ 1359.025188] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1359.025841] kmem_cache_alloc+0x159/0x310 [ 1359.026349] FAULT_INJECTION: forcing a failure. [ 1359.026349] name failslab, interval 1, probability 0, space 0, times 0 [ 1359.026369] ? ext4_dx_find_entry+0x600/0x600 [ 1359.026388] jbd2__journal_start+0x190/0x7e0 [ 1359.028994] __ext4_journal_start_sb+0x214/0x390 [ 1359.029617] ext4_rename+0x96d/0x2bc0 [ 1359.030110] ? ext4_tmpfile+0x440/0x440 [ 1359.030619] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1359.031294] ? lock_acquire+0x197/0x470 [ 1359.031799] ? vfs_rename+0xcb5/0x1510 [ 1359.032308] ? lockref_get+0x11/0x50 [ 1359.032780] ? find_held_lock+0x2c/0x110 [ 1359.033474] ? down_write_nested+0xe4/0x160 [ 1359.034031] ext4_rename2+0x1af/0x240 [ 1359.034521] vfs_rename+0xd6c/0x1510 [ 1359.035004] ? vfs_unlink+0x8b0/0x8b0 [ 1359.035498] ? lookup_dcache+0x65/0x130 [ 1359.036043] do_renameat2+0xae1/0xbf0 [ 1359.036534] ? __ia32_sys_link+0x80/0x80 [ 1359.037056] ? __virt_addr_valid+0x170/0x5d0 [ 1359.037626] ? __check_object_size+0x319/0x440 [ 1359.038274] __x64_sys_rename+0x7d/0xa0 [ 1359.038783] do_syscall_64+0x33/0x40 [ 1359.039260] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1359.039913] RIP: 0033:0x7f117e426b19 [ 1359.040387] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1359.042781] RSP: 002b:00007f117b97b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1359.043753] RAX: ffffffffffffffda RBX: 00007f117e53a020 RCX: 00007f117e426b19 [ 1359.044689] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1359.046425] RBP: 00007f117b97b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1359.048224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1359.050316] R13: 00007fff9db729bf R14: 00007f117b97b300 R15: 0000000000022000 [ 1359.053205] CPU: 0 PID: 8479 Comm: syz-executor.4 Not tainted 5.10.238 #1 [ 1359.054406] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1359.055750] Call Trace: [ 1359.056196] dump_stack+0x107/0x167 [ 1359.056779] should_fail.cold+0x5/0xa [ 1359.057436] ? create_object.isra.0+0x3a/0xa20 [ 1359.058175] should_failslab+0x5/0x20 [ 1359.058788] kmem_cache_alloc+0x5b/0x310 [ 1359.059445] create_object.isra.0+0x3a/0xa20 [ 1359.060181] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1359.061004] kmem_cache_alloc+0x159/0x310 [ 1359.061724] ? strncpy_from_user+0x9e/0x470 [ 1359.062423] getname_flags.part.0+0x50/0x4f0 [ 1359.063135] getname_flags+0x9a/0xe0 [ 1359.063737] __x64_sys_rename+0x65/0xa0 [ 1359.064408] do_syscall_64+0x33/0x40 [ 1359.065008] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1359.065961] RIP: 0033:0x7ff983930b19 [ 1359.066573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1359.069606] RSP: 002b:00007ff980e85188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1359.070643] RAX: ffffffffffffffda RBX: 00007ff983a44020 RCX: 00007ff983930b19 [ 1359.071639] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1359.072661] RBP: 00007ff980e851d0 R08: 0000000000000000 R09: 0000000000000000 [ 1359.073645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1359.074618] R13: 00007ffced023aaf R14: 00007ff980e85300 R15: 0000000000022000 [ 1359.076123] loop0: detected capacity change from 0 to 41948160 [ 1359.081543] FAULT_INJECTION: forcing a failure. [ 1359.081543] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1359.084499] CPU: 1 PID: 8478 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1359.085675] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1359.086736] Call Trace: [ 1359.087075] dump_stack+0x107/0x167 [ 1359.087543] should_fail.cold+0x5/0xa [ 1359.088034] strncpy_from_user+0x34/0x470 [ 1359.088568] getname_flags.part.0+0x95/0x4f0 [ 1359.089226] getname_flags+0x9a/0xe0 [ 1359.089729] __x64_sys_rename+0x65/0xa0 [ 1359.090273] do_syscall_64+0x33/0x40 [ 1359.090748] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1359.091444] RIP: 0033:0x7f4eb49c4b19 [ 1359.091921] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1359.094290] RSP: 002b:00007f4eb1f19188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1359.095298] RAX: ffffffffffffffda RBX: 00007f4eb4ad8020 RCX: 00007f4eb49c4b19 [ 1359.096208] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1359.097147] RBP: 00007f4eb1f191d0 R08: 0000000000000000 R09: 0000000000000000 [ 1359.098083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1359.098997] R13: 00007ffdf23d638f R14: 00007f4eb1f19300 R15: 0000000000022000 [ 1359.102388] loop5: detected capacity change from 0 to 41948160 [ 1359.111519] FAULT_INJECTION: forcing a failure. [ 1359.111519] name failslab, interval 1, probability 0, space 0, times 0 [ 1359.113152] CPU: 0 PID: 8473 Comm: syz-executor.2 Not tainted 5.10.238 #1 [ 1359.114093] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1359.115266] Call Trace: [ 1359.115630] dump_stack+0x107/0x167 [ 1359.116133] should_fail.cold+0x5/0xa [ 1359.116657] ? create_object.isra.0+0x3a/0xa20 [ 1359.121341] should_failslab+0x5/0x20 [ 1359.121944] kmem_cache_alloc+0x5b/0x310 [ 1359.122613] ? __ext4_find_entry+0x9f1/0xfc0 [ 1359.123293] create_object.isra.0+0x3a/0xa20 [ 1359.123965] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1359.124768] kmem_cache_alloc+0x159/0x310 [ 1359.125483] ? ext4_dx_find_entry+0x600/0x600 [ 1359.126172] jbd2__journal_start+0x190/0x7e0 [ 1359.133180] __ext4_journal_start_sb+0x214/0x390 [ 1359.133920] ext4_rename+0x96d/0x2bc0 [ 1359.134518] ? ext4_tmpfile+0x440/0x440 [ 1359.135134] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1359.135948] ? lock_acquire+0x197/0x470 [ 1359.136554] ? vfs_rename+0xcb5/0x1510 [ 1359.137205] ? lockref_get+0x11/0x50 [ 1359.137774] ? find_held_lock+0x2c/0x110 [ 1359.138406] ? down_write_nested+0xe4/0x160 [ 1359.139074] ext4_rename2+0x1af/0x240 [ 1359.139702] vfs_rename+0xd6c/0x1510 [ 1359.140267] ? vfs_unlink+0x8b0/0x8b0 [ 1359.140883] ? lookup_dcache+0x65/0x130 [ 1359.141502] do_renameat2+0xae1/0xbf0 [ 1359.142084] ? __ia32_sys_link+0x80/0x80 [ 1359.142704] ? __virt_addr_valid+0x170/0x5d0 [ 1359.143390] ? __check_object_size+0x319/0x440 [ 1359.144098] __x64_sys_rename+0x7d/0xa0 [ 1359.149225] do_syscall_64+0x33/0x40 [ 1359.149796] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1359.150590] RIP: 0033:0x7f5abea14b19 [ 1359.151177] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1359.154083] RSP: 002b:00007f5abbf69188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1359.155278] RAX: ffffffffffffffda RBX: 00007f5abeb28020 RCX: 00007f5abea14b19 [ 1359.156391] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1359.157482] RBP: 00007f5abbf691d0 R08: 0000000000000000 R09: 0000000000000000 [ 1359.158558] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1359.159665] R13: 00007ffe1e8b4a0f R14: 00007f5abbf69300 R15: 0000000000022000 12:45:31 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 9) 12:45:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:45:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 7) 12:45:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 9) [ 1359.256111] FAULT_INJECTION: forcing a failure. [ 1359.256111] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1359.259566] CPU: 0 PID: 8477 Comm: syz-executor.5 Not tainted 5.10.238 #1 [ 1359.261483] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1359.263795] Call Trace: [ 1359.264512] dump_stack+0x107/0x167 [ 1359.265566] should_fail.cold+0x5/0xa [ 1359.266573] _copy_to_user+0x2e/0x180 [ 1359.267579] simple_read_from_buffer+0xcc/0x160 [ 1359.268826] proc_fail_nth_read+0x198/0x230 [ 1359.270179] ? proc_sessionid_read+0x230/0x230 [ 1359.271386] ? security_file_permission+0xb1/0xe0 [ 1359.272719] ? proc_sessionid_read+0x230/0x230 [ 1359.274217] vfs_read+0x228/0x620 [ 1359.275135] ksys_read+0x12d/0x260 [ 1359.276098] ? vfs_write+0xb10/0xb10 [ 1359.277090] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1359.278765] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1359.280149] do_syscall_64+0x33/0x40 [ 1359.281237] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1359.282603] RIP: 0033:0x7fe0b679669c [ 1359.283623] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1359.289482] RSP: 002b:00007fe0b3d38170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1359.291632] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fe0b679669c [ 1359.293658] RDX: 000000000000000f RSI: 00007fe0b3d381e0 RDI: 0000000000000005 [ 1359.295677] RBP: 00007fe0b3d381d0 R08: 0000000000000000 R09: 0000000000000000 12:45:31 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0xb24040, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') rmdir(&(0x7f0000000000)='./mnt\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') setxattr$trusted_overlay_redirect(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x8, 0x1) [ 1359.297685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1359.299630] loop0: detected capacity change from 0 to 41948160 [ 1359.305477] R13: 00007ffc1e51636f R14: 00007fe0b3d38300 R15: 0000000000022000 [ 1359.312207] FAULT_INJECTION: forcing a failure. [ 1359.312207] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1359.318282] CPU: 0 PID: 8483 Comm: syz-executor.7 Not tainted 5.10.238 #1 [ 1359.319224] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1359.320360] Call Trace: [ 1359.320756] dump_stack+0x107/0x167 [ 1359.321278] should_fail.cold+0x5/0xa [ 1359.321847] _copy_to_user+0x2e/0x180 [ 1359.322374] simple_read_from_buffer+0xcc/0x160 [ 1359.323014] proc_fail_nth_read+0x198/0x230 [ 1359.323608] ? proc_sessionid_read+0x230/0x230 [ 1359.324234] ? security_file_permission+0xb1/0xe0 [ 1359.324899] ? proc_sessionid_read+0x230/0x230 [ 1359.325559] vfs_read+0x228/0x620 [ 1359.326074] ksys_read+0x12d/0x260 [ 1359.326561] ? vfs_write+0xb10/0xb10 [ 1359.327076] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1359.327827] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1359.328544] do_syscall_64+0x33/0x40 [ 1359.329097] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1359.329808] RIP: 0033:0x7f7f3590669c [ 1359.330318] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1359.332841] RSP: 002b:00007f7f32ec9170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1359.333900] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7f3590669c [ 1359.334875] RDX: 000000000000000f RSI: 00007f7f32ec91e0 RDI: 0000000000000003 [ 1359.335880] RBP: 00007f7f32ec91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1359.336896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1359.337894] R13: 00007ffc91ebe3df R14: 00007f7f32ec9300 R15: 0000000000022000 [ 1359.348409] FAULT_INJECTION: forcing a failure. [ 1359.348409] name failslab, interval 1, probability 0, space 0, times 0 [ 1359.349907] CPU: 1 PID: 8487 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1359.350816] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1359.351864] Call Trace: [ 1359.352200] dump_stack+0x107/0x167 [ 1359.352665] should_fail.cold+0x5/0xa [ 1359.353165] ? __d_alloc+0x2a/0x990 [ 1359.353666] should_failslab+0x5/0x20 [ 1359.354148] kmem_cache_alloc+0x5b/0x310 [ 1359.354669] __d_alloc+0x2a/0x990 [ 1359.355114] ? dput+0x1ae/0xcd0 [ 1359.355540] d_alloc+0x46/0x1c0 [ 1359.355963] __lookup_hash+0xcc/0x190 [ 1359.356451] do_renameat2+0x51f/0xbf0 [ 1359.356943] ? __ia32_sys_link+0x80/0x80 [ 1359.357491] ? __virt_addr_valid+0x170/0x5d0 [ 1359.358075] ? __check_object_size+0x319/0x440 [ 1359.358690] ? getname_flags.part.0+0x1dd/0x4f0 [ 1359.359308] __x64_sys_rename+0x7d/0xa0 [ 1359.359816] do_syscall_64+0x33/0x40 [ 1359.360293] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1359.360977] RIP: 0033:0x7f4eb49c4b19 [ 1359.361463] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1359.363809] RSP: 002b:00007f4eb1f3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1359.364784] RAX: ffffffffffffffda RBX: 00007f4eb4ad7f60 RCX: 00007f4eb49c4b19 [ 1359.365704] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1359.366616] RBP: 00007f4eb1f3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1359.367535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1359.368460] R13: 00007ffdf23d638f R14: 00007f4eb1f3a300 R15: 0000000000022000 [ 1359.376801] FAULT_INJECTION: forcing a failure. [ 1359.376801] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1359.378301] CPU: 1 PID: 8490 Comm: syz-executor.1 Not tainted 5.10.238 #1 [ 1359.379197] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1359.380253] Call Trace: [ 1359.380591] dump_stack+0x107/0x167 [ 1359.381057] should_fail.cold+0x5/0xa [ 1359.381565] _copy_to_user+0x2e/0x180 [ 1359.382056] simple_read_from_buffer+0xcc/0x160 [ 1359.382683] proc_fail_nth_read+0x198/0x230 [ 1359.383232] ? proc_sessionid_read+0x230/0x230 [ 1359.383859] ? security_file_permission+0xb1/0xe0 [ 1359.384477] ? proc_sessionid_read+0x230/0x230 [ 1359.385058] vfs_read+0x228/0x620 [ 1359.385554] ksys_read+0x12d/0x260 [ 1359.386052] ? vfs_write+0xb10/0xb10 [ 1359.386594] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1359.387342] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1359.388130] do_syscall_64+0x33/0x40 [ 1359.388668] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1359.389412] RIP: 0033:0x7f117e3d969c [ 1359.389968] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1359.392639] RSP: 002b:00007f117b99c170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1359.393759] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f117e3d969c [ 1359.394788] RDX: 000000000000000f RSI: 00007f117b99c1e0 RDI: 0000000000000003 [ 1359.395793] RBP: 00007f117b99c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1359.396791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1359.397826] R13: 00007fff9db729bf R14: 00007f117b99c300 R15: 0000000000022000 12:45:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 6) 12:45:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:45:31 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r2) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@empty}}, {{@in=@broadcast}, 0x0, @in=@private}}, &(0x7f0000000440)=0xe8) setxattr$security_evm(&(0x7f0000000240)='./mnt\x00', &(0x7f0000000280), &(0x7f0000000300)=@v1={0x2, "e7d54f1502b7857ce7e4"}, 0xb, 0x2) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000200)='./file1\x00') flock(r1, 0x8) 12:45:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 9) [ 1359.504030] FAULT_INJECTION: forcing a failure. [ 1359.504030] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1359.509859] CPU: 0 PID: 8500 Comm: syz-executor.4 Not tainted 5.10.238 #1 [ 1359.510799] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1359.511975] Call Trace: [ 1359.512341] dump_stack+0x107/0x167 [ 1359.512842] should_fail.cold+0x5/0xa [ 1359.513394] strncpy_from_user+0x34/0x470 [ 1359.513971] getname_flags.part.0+0x95/0x4f0 [ 1359.514571] getname_flags+0x9a/0xe0 [ 1359.515127] __x64_sys_rename+0x65/0xa0 [ 1359.515675] do_syscall_64+0x33/0x40 [ 1359.516187] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1359.516890] RIP: 0033:0x7ff983930b19 [ 1359.517416] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1359.520001] RSP: 002b:00007ff980ea6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1359.521085] RAX: ffffffffffffffda RBX: 00007ff983a43f60 RCX: 00007ff983930b19 [ 1359.522112] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1359.523101] RBP: 00007ff980ea61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1359.524075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1359.525053] R13: 00007ffced023aaf R14: 00007ff980ea6300 R15: 0000000000022000 [ 1359.531497] loop5: detected capacity change from 0 to 41948160 [ 1359.538033] loop2: detected capacity change from 0 to 41948160 [ 1359.598555] FAULT_INJECTION: forcing a failure. [ 1359.598555] name failslab, interval 1, probability 0, space 0, times 0 [ 1359.600240] CPU: 1 PID: 8505 Comm: syz-executor.2 Not tainted 5.10.238 #1 [ 1359.601117] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1359.602207] Call Trace: [ 1359.602545] dump_stack+0x107/0x167 [ 1359.603011] should_fail.cold+0x5/0xa [ 1359.603542] ? fat_parse_long.constprop.0+0x8e9/0xb50 [ 1359.604199] should_failslab+0x5/0x20 [ 1359.604683] kmem_cache_alloc+0x5b/0x310 [ 1359.605251] fat_parse_long.constprop.0+0x8e9/0xb50 [ 1359.605878] ? vfat_lookup+0xeb/0x610 [ 1359.606416] fat_search_long+0x380/0xd90 [ 1359.606943] ? fat_parse_short+0xd30/0xd30 [ 1359.607482] ? vfat_lookup+0xeb/0x610 [ 1359.607976] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1359.608643] ? slab_free_freelist_hook+0x180/0x180 [ 1359.609311] ? find_held_lock+0x2c/0x110 [ 1359.609834] ? lock_acquire+0x197/0x470 [ 1359.610386] ? find_held_lock+0x2c/0x110 [ 1359.610908] vfat_lookup+0x2d4/0x610 [ 1359.611387] ? vfat_revalidate+0x190/0x190 [ 1359.611925] ? rwlock_bug.part.0+0x90/0x90 [ 1359.612466] ? do_raw_spin_unlock+0x4f/0x220 [ 1359.613050] ? _raw_spin_unlock+0x1a/0x30 [ 1359.613605] __lookup_hash+0x121/0x190 [ 1359.614122] do_renameat2+0x51f/0xbf0 [ 1359.614639] ? __ia32_sys_link+0x80/0x80 [ 1359.615164] ? __virt_addr_valid+0x170/0x5d0 [ 1359.615725] ? __check_object_size+0x319/0x440 [ 1359.616349] ? getname_flags.part.0+0x1dd/0x4f0 [ 1359.616945] __x64_sys_rename+0x7d/0xa0 [ 1359.617509] do_syscall_64+0x33/0x40 [ 1359.617985] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1359.618644] RIP: 0033:0x7f5abea14b19 [ 1359.619118] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1359.621513] RSP: 002b:00007f5abbf8a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1359.622482] RAX: ffffffffffffffda RBX: 00007f5abeb27f60 RCX: 00007f5abea14b19 [ 1359.623391] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1359.624331] RBP: 00007f5abbf8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1359.625290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1359.626197] R13: 00007ffe1e8b4a0f R14: 00007f5abbf8a300 R15: 0000000000022000 [ 1373.422970] loop6: detected capacity change from 0 to 41948160 [ 1373.450968] loop7: detected capacity change from 0 to 41948160 12:45:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:45:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 10) 12:45:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000200)='./mnt/file0\x00', &(0x7f0000000000)='./file0\x00') 12:45:45 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='./mnt\x00', 0x4) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@private2, @in=@local}}, {{}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1}, './mnt\x00'}) 12:45:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 8) 12:45:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file1\x00', 0x0, 0x80) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x40) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:45:45 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:45:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 7) [ 1373.461558] loop0: detected capacity change from 0 to 41948160 [ 1373.465778] loop2: detected capacity change from 0 to 41948160 [ 1373.469410] loop5: detected capacity change from 0 to 41948160 [ 1373.477517] loop1: detected capacity change from 0 to 41948160 [ 1373.493547] loop4: detected capacity change from 0 to 41948160 [ 1373.499321] loop3: detected capacity change from 0 to 41948160 [ 1373.522916] FAULT_INJECTION: forcing a failure. [ 1373.522916] name failslab, interval 1, probability 0, space 0, times 0 [ 1373.524536] CPU: 0 PID: 8517 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1373.525520] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1373.526687] Call Trace: [ 1373.527054] dump_stack+0x107/0x167 [ 1373.527555] should_fail.cold+0x5/0xa [ 1373.528079] ? create_object.isra.0+0x3a/0xa20 [ 1373.528738] should_failslab+0x5/0x20 [ 1373.529263] kmem_cache_alloc+0x5b/0x310 [ 1373.529866] create_object.isra.0+0x3a/0xa20 [ 1373.530466] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1373.531164] kmem_cache_alloc+0x159/0x310 [ 1373.531737] __d_alloc+0x2a/0x990 [ 1373.532217] ? dput+0x1ae/0xcd0 [ 1373.532695] d_alloc+0x46/0x1c0 [ 1373.533146] __lookup_hash+0xcc/0x190 [ 1373.533722] do_renameat2+0x51f/0xbf0 [ 1373.534251] ? __ia32_sys_link+0x80/0x80 [ 1373.534814] ? __virt_addr_valid+0x170/0x5d0 [ 1373.535418] ? __check_object_size+0x319/0x440 [ 1373.536054] ? getname_flags.part.0+0x1dd/0x4f0 [ 1373.536700] __x64_sys_rename+0x7d/0xa0 [ 1373.537251] do_syscall_64+0x33/0x40 [ 1373.537767] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1373.538463] RIP: 0033:0x7f4eb49c4b19 [ 1373.538969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1373.541495] RSP: 002b:00007f4eb1f3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1373.542538] RAX: ffffffffffffffda RBX: 00007f4eb4ad7f60 RCX: 00007f4eb49c4b19 [ 1373.543513] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1373.544488] RBP: 00007f4eb1f3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1373.545476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1373.546451] R13: 00007ffdf23d638f R14: 00007f4eb1f3a300 R15: 0000000000022000 [ 1373.564161] FAULT_INJECTION: forcing a failure. [ 1373.564161] name failslab, interval 1, probability 0, space 0, times 0 [ 1373.565690] CPU: 1 PID: 8525 Comm: syz-executor.4 Not tainted 5.10.238 #1 [ 1373.566552] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1373.567603] Call Trace: [ 1373.567939] dump_stack+0x107/0x167 [ 1373.568404] should_fail.cold+0x5/0xa [ 1373.568889] ? __d_alloc+0x2a/0x990 [ 1373.569375] should_failslab+0x5/0x20 [ 1373.569895] kmem_cache_alloc+0x5b/0x310 [ 1373.570420] __d_alloc+0x2a/0x990 [ 1373.570860] ? dput+0x1ae/0xcd0 [ 1373.571287] d_alloc+0x46/0x1c0 [ 1373.571716] __lookup_hash+0xcc/0x190 [ 1373.572205] do_renameat2+0x51f/0xbf0 [ 1373.572699] ? __ia32_sys_link+0x80/0x80 [ 1373.573224] ? __virt_addr_valid+0x170/0x5d0 [ 1373.573804] ? __check_object_size+0x319/0x440 [ 1373.574400] ? getname_flags.part.0+0x1dd/0x4f0 [ 1373.575006] __x64_sys_rename+0x7d/0xa0 [ 1373.575544] do_syscall_64+0x33/0x40 [ 1373.576020] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1373.576672] RIP: 0033:0x7ff983930b19 [ 1373.577148] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1373.579552] RSP: 002b:00007ff980ea6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1373.580529] RAX: ffffffffffffffda RBX: 00007ff983a43f60 RCX: 00007ff983930b19 [ 1373.581455] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1373.582366] RBP: 00007ff980ea61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1373.583279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1373.584190] R13: 00007ffced023aaf R14: 00007ff980ea6300 R15: 0000000000022000 [ 1373.593458] FAULT_INJECTION: forcing a failure. [ 1373.593458] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1373.595036] CPU: 1 PID: 8523 Comm: syz-executor.2 Not tainted 5.10.238 #1 [ 1373.595906] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1373.596964] Call Trace: [ 1373.597314] dump_stack+0x107/0x167 [ 1373.598473] should_fail.cold+0x5/0xa [ 1373.599428] __alloc_pages_nodemask+0x182/0x600 [ 1373.600612] ? __alloc_pages_slowpath.constprop.0+0x2200/0x2200 [ 1373.602327] alloc_pages_current+0x187/0x280 [ 1373.603431] allocate_slab+0x26f/0x380 [ 1373.604408] ___slab_alloc+0x470/0x700 [ 1373.605438] ? fat_parse_long.constprop.0+0x8e9/0xb50 [ 1373.606747] ? fat_parse_long.constprop.0+0x8e9/0xb50 [ 1373.608196] ? kmem_cache_alloc+0x301/0x310 [ 1373.609514] kmem_cache_alloc+0x301/0x310 [ 1373.610744] fat_parse_long.constprop.0+0x8e9/0xb50 [ 1373.612245] ? vfat_lookup+0xeb/0x610 [ 1373.613436] fat_search_long+0x380/0xd90 [ 1373.614679] ? fat_parse_short+0xd30/0xd30 [ 1373.615968] ? vfat_lookup+0xeb/0x610 [ 1373.617101] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1373.618697] ? slab_free_freelist_hook+0x180/0x180 [ 1373.620134] ? find_held_lock+0x2c/0x110 [ 1373.621343] ? lock_acquire+0x197/0x470 [ 1373.622507] ? find_held_lock+0x2c/0x110 [ 1373.623714] vfat_lookup+0x2d4/0x610 [ 1373.624821] ? vfat_revalidate+0x190/0x190 [ 1373.626081] ? rwlock_bug.part.0+0x90/0x90 [ 1373.627332] ? do_raw_spin_unlock+0x4f/0x220 [ 1373.628629] ? _raw_spin_unlock+0x1a/0x30 [ 1373.629873] __lookup_hash+0x121/0x190 [ 1373.631026] do_renameat2+0x51f/0xbf0 [ 1373.632153] ? __ia32_sys_link+0x80/0x80 [ 1373.633367] ? __virt_addr_valid+0x170/0x5d0 [ 1373.634736] ? __check_object_size+0x319/0x440 [ 1373.636096] ? getname_flags.part.0+0x1dd/0x4f0 [ 1373.637513] __x64_sys_rename+0x7d/0xa0 [ 1373.638684] do_syscall_64+0x33/0x40 [ 1373.639789] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1373.641316] RIP: 0033:0x7f5abea14b19 [ 1373.642447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1373.648049] RSP: 002b:00007f5abbf8a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1373.650333] RAX: ffffffffffffffda RBX: 00007f5abeb27f60 RCX: 00007f5abea14b19 [ 1373.652453] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1373.654627] RBP: 00007f5abbf8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1373.656815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1373.658949] R13: 00007ffe1e8b4a0f R14: 00007f5abbf8a300 R15: 0000000000022000 12:45:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 9) 12:45:45 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1008}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2, 0x20010, 0xffffffffffffffff, 0x8000000) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000000, 0x4000010, 0xffffffffffffffff, 0x10000000) sendmmsg$inet(r0, &(0x7f00000035c0)=[{{&(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10, 0x0}}, {{&(0x7f0000001140)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f00000015c0)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @multicast1, @local}}}], 0x20}}], 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') readv(r1, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4098, 0x1002}], 0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000100)={0x6, 0x6, 0xc18d, 0xfffffffa, 0x400}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="a6ffffff000083002e2f62696c653200"]) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:45:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20000, 0x44) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:45:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r1) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x0, &(0x7f0000000180), 0x810000, &(0x7f0000000700)=ANY=[@ANYBLOB="72230a95a61f796b34ae0ca7ce0cb3464548cc21201f9fafc78b3ca1156860ee51725ad0b2dc8eb34cae166179a38224bfc6ef3f4e567cac25eca3dc6fb1a2a55ca0ee55090df3ebd796691a07118095af65b07024748d33c601bc2eba1d08f719e7cace1a7d3acfee55e49ed51ac5524ea4af1d2e43379ee9a5789064b871961d5abfeb4475018a78e81a907e5ef6cbd1d969bdb1a068ad76422bff56167416af7a5c6f49e577daea1b8652845fcf42b4307a7e73d9b547a7a380f009fb17e4a269c521", @ANYBLOB="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", @ANYRES32, @ANYRESOCT=r1, @ANYRESHEX, @ANYBLOB="84227e814264dbbbab26f96c9d361f7f3dd82f0f27683755d32c00b0691f38c1e6f5bb31cb1c264b66b9c0e1a225f2d4ef92e55d9bb0025eb6a2d9cf6616da3d6ddc797cdcb13877eaefd9e81adfaebafc0c27543c5e2da88369c493e69ab743344f6a3be30759e1207fb1de36c70545f4207adfa91cdb25032d5ae36402f8cacfbacaa7e354fa085c3aab2aead9780825b488482ac0730349f4cfd098c9364240ea339f98a98e64cbe29519c27882720b246efe54256339f8c65a8afa009e82ec883af7d6e0b1c989a399b09b7477fd2dc6ebe9fb2369a3bd8bdbefa77b977a8bc7", @ANYRES16=r0]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x40) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r2) accept4(r2, &(0x7f0000000200)=@isdn, &(0x7f0000000000)=0x80, 0x800) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:45:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 8) 12:45:45 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f010001000062643000"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='logfs\x00', 0x1080080, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x0, 0x30, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000280)='mnt/encrypted_dir\x00', 0xc8) syz_io_uring_submit(r0, 0x0, &(0x7f0000000340)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x1, 0x0, r1, 0x0, &(0x7f0000000300)="fa30d98451d2f85e1df21277c11f5343b823054c8c2c7b1c87350825f2d012e1b210ab386e90148f4abca2ebb565deb2c8", 0x31, 0x10040}, 0xffff) 12:45:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') recvmmsg$unix(0xffffffffffffffff, &(0x7f0000004000)=[{{&(0x7f0000000200), 0x6e, &(0x7f00000018c0)=[{&(0x7f0000000000)=""/17, 0x11}, {&(0x7f0000000280)=""/61, 0x3d}, {&(0x7f0000000300)=""/87, 0x57}, {&(0x7f0000000380)=""/130, 0x82}, {&(0x7f0000000500)=""/183, 0xb7}, {&(0x7f00000005c0)=""/200, 0xc8}, {&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/247, 0xf7}, {&(0x7f00000017c0)=""/230, 0xe6}], 0x9}}, {{&(0x7f0000000440), 0x6e, &(0x7f0000002e40)=[{&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/3, 0x3}, {&(0x7f00000029c0)=""/107, 0x6b}, {&(0x7f0000002a40)=""/197, 0xc5}, {&(0x7f0000002b40)=""/142, 0x8e}, {&(0x7f0000002c00)=""/77, 0x4d}, {&(0x7f0000002c80)=""/236, 0xec}, {&(0x7f0000002d80)=""/158, 0x9e}], 0x8, &(0x7f0000002ec0)}}, {{&(0x7f0000002f00), 0x6e, &(0x7f0000003080)=[{&(0x7f0000002f80)=""/38, 0x26}, {&(0x7f0000002fc0)=""/146, 0x92}], 0x2, &(0x7f00000030c0)=ANY=[@ANYBLOB="1890e2000008000001000000e4ff0000", @ANYRES32, @ANYRES32, @ANYBLOB="10000000000000000100000001000000"], 0x28}}, {{&(0x7f0000003100), 0x6e, &(0x7f0000003780)=[{&(0x7f0000003180)=""/158, 0x9e}, {&(0x7f0000003240)=""/121, 0x79}, {&(0x7f00000032c0)=""/249, 0xf9}, {&(0x7f00000033c0)=""/162, 0xa2}, {&(0x7f0000003480)=""/58, 0x3a}, {&(0x7f00000034c0)=""/119, 0x77}, {&(0x7f0000003540)=""/117, 0x75}, {&(0x7f00000035c0)=""/148, 0x94}, {&(0x7f0000003680)=""/70, 0x46}, {&(0x7f0000003700)=""/67, 0x43}], 0xa, &(0x7f0000003840)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000003880)=@abs, 0x6e, &(0x7f0000003b40)=[{&(0x7f0000003900)=""/45, 0x2d}, {&(0x7f0000003940)=""/247, 0xf7}, {&(0x7f0000003a40)=""/211, 0xd3}], 0x3, &(0x7f0000003b80)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{0x0, 0x0, &(0x7f0000003d00)=[{&(0x7f0000003bc0)=""/81, 0x51}, {&(0x7f0000003c40)=""/191, 0xbf}], 0x2, &(0x7f0000003d40)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}}, {{&(0x7f0000003dc0), 0x6e, &(0x7f0000003f00)=[{&(0x7f0000003e40)=""/178, 0xb2}], 0x1, &(0x7f0000003f40)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x98}}], 0x7, 0x63, &(0x7f00000041c0)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:45:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 11) [ 1373.781281] loop6: detected capacity change from 0 to 41948160 [ 1373.799038] loop5: detected capacity change from 0 to 41948160 [ 1373.807102] loop0: detected capacity change from 0 to 41948160 [ 1373.810509] loop3: detected capacity change from 0 to 41948160 [ 1373.824440] FAT-fs (loop1): Unrecognized mount option "r# [ 1373.824440] •¦yk4® §Î ³FEHÌ! Ÿ¯Ç‹<¡h`îQrZв܎³L®ay£‚$¿Æï?NV|¬%ì£Üo±¢¥\ îU óë×–i€•¯e°p$t3Ƽ.º÷çÊÎ}:ÏîUäžÕÅRN¤¯.C7žé¥xd¸q–Z¿ëDuŠxè~^öËÑÙi½± h­vB+ÿVt¯z\oIåwÚê†R„_ÏB´0z~sÙµG§£€ð ûä¢iÅ! ´%ÔŽKx`¤œ‡áû·zx" or missing value [ 1373.892786] FAULT_INJECTION: forcing a failure. [ 1373.892786] name failslab, interval 1, probability 0, space 0, times 0 [ 1373.894284] CPU: 1 PID: 8548 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1373.895154] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1373.896238] Call Trace: [ 1373.896577] dump_stack+0x107/0x167 [ 1373.897068] should_fail.cold+0x5/0xa [ 1373.897600] ? fat_parse_long.constprop.0+0x8e9/0xb50 [ 1373.898259] should_failslab+0x5/0x20 [ 1373.898745] kmem_cache_alloc+0x5b/0x310 [ 1373.899271] fat_parse_long.constprop.0+0x8e9/0xb50 [ 1373.899904] ? vfat_lookup+0xeb/0x610 [ 1373.900418] fat_search_long+0x380/0xd90 [ 1373.900941] ? fat_parse_short+0xd30/0xd30 [ 1373.901540] ? vfat_lookup+0xeb/0x610 [ 1373.902035] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1373.902700] ? slab_free_freelist_hook+0x180/0x180 [ 1373.903321] ? find_held_lock+0x2c/0x110 [ 1373.903848] ? lock_acquire+0x197/0x470 [ 1373.904354] ? find_held_lock+0x2c/0x110 [ 1373.904872] vfat_lookup+0x2d4/0x610 [ 1373.905421] ? vfat_revalidate+0x190/0x190 [ 1373.905959] ? rwlock_bug.part.0+0x90/0x90 [ 1373.906501] ? do_raw_spin_unlock+0x4f/0x220 [ 1373.907062] ? _raw_spin_unlock+0x1a/0x30 [ 1373.907593] __lookup_hash+0x121/0x190 [ 1373.908125] do_renameat2+0x51f/0xbf0 [ 1373.908616] ? __ia32_sys_link+0x80/0x80 [ 1373.909171] ? __virt_addr_valid+0x170/0x5d0 [ 1373.909760] ? __check_object_size+0x319/0x440 [ 1373.910355] ? getname_flags.part.0+0x1dd/0x4f0 [ 1373.910957] __x64_sys_rename+0x7d/0xa0 [ 1373.911468] do_syscall_64+0x33/0x40 [ 1373.911945] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1373.912596] RIP: 0033:0x7f4eb49c4b19 [ 1373.913090] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1373.915469] RSP: 002b:00007f4eb1f3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1373.916473] RAX: ffffffffffffffda RBX: 00007f4eb4ad7f60 RCX: 00007f4eb49c4b19 [ 1373.917441] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1373.918347] RBP: 00007f4eb1f3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1373.919255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1373.920197] R13: 00007ffdf23d638f R14: 00007f4eb1f3a300 R15: 0000000000022000 [ 1373.923537] loop7: detected capacity change from 0 to 41948160 [ 1373.929511] loop4: detected capacity change from 0 to 41948160 [ 1373.963287] loop2: detected capacity change from 0 to 41948160 [ 1373.972183] FAULT_INJECTION: forcing a failure. [ 1373.972183] name failslab, interval 1, probability 0, space 0, times 0 [ 1373.973642] CPU: 1 PID: 8567 Comm: syz-executor.4 Not tainted 5.10.238 #1 [ 1373.974509] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1373.975560] Call Trace: [ 1373.975902] dump_stack+0x107/0x167 [ 1373.976369] should_fail.cold+0x5/0xa [ 1373.976858] ? create_object.isra.0+0x3a/0xa20 [ 1373.977471] should_failslab+0x5/0x20 [ 1373.977972] kmem_cache_alloc+0x5b/0x310 [ 1373.978496] create_object.isra.0+0x3a/0xa20 [ 1373.979062] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1373.979730] kmem_cache_alloc+0x159/0x310 [ 1373.980269] __d_alloc+0x2a/0x990 [ 1373.980710] ? dput+0x1ae/0xcd0 [ 1373.981135] d_alloc+0x46/0x1c0 [ 1373.981583] __lookup_hash+0xcc/0x190 [ 1373.982073] do_renameat2+0x51f/0xbf0 [ 1373.982566] ? __ia32_sys_link+0x80/0x80 [ 1373.983108] ? __virt_addr_valid+0x170/0x5d0 [ 1373.983683] ? __check_object_size+0x319/0x440 [ 1373.984311] ? getname_flags.part.0+0x1dd/0x4f0 [ 1373.984918] __x64_sys_rename+0x7d/0xa0 [ 1373.985449] do_syscall_64+0x33/0x40 [ 1373.985927] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1373.986581] RIP: 0033:0x7ff983930b19 [ 1373.987061] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1373.989516] RSP: 002b:00007ff980ea6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1373.990481] RAX: ffffffffffffffda RBX: 00007ff983a43f60 RCX: 00007ff983930b19 [ 1373.991386] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1373.992331] RBP: 00007ff980ea61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1373.993268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1373.994187] R13: 00007ffced023aaf R14: 00007ff980ea6300 R15: 0000000000022000 [ 1374.040019] FAT-fs (loop1): Unrecognized mount option "r# [ 1374.040019] •¦yk4® §Î ³FEHÌ! Ÿ¯Ç‹<¡h`îQrZв܎³L®ay£‚$¿Æï?NV|¬%ì£Üo±¢¥\ îU óë×–i€•¯e°p$t3Ƽ.º÷çÊÎ}:ÏîUäžÕÅRN¤¯.C7žé¥xd¸q–Z¿ëDuŠxè~^öËÑÙi½± h­vB+ÿVt¯z\oIåwÚê†R„_ÏB´0z~sÙµG§£€ð ûä¢iÅ! ´%ÔŽKx`¤œ‡áû·zx" or missing value [ 1374.062661] FAULT_INJECTION: forcing a failure. [ 1374.062661] name failslab, interval 1, probability 0, space 0, times 0 [ 1374.064361] CPU: 1 PID: 8573 Comm: syz-executor.2 Not tainted 5.10.238 #1 [ 1374.065247] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1374.066314] Call Trace: [ 1374.066657] dump_stack+0x107/0x167 [ 1374.067126] should_fail.cold+0x5/0xa [ 1374.067616] ? fat_parse_long.constprop.0+0x8e9/0xb50 [ 1374.068278] should_failslab+0x5/0x20 [ 1374.068765] kmem_cache_alloc+0x5b/0x310 [ 1374.069300] fat_parse_long.constprop.0+0x8e9/0xb50 [ 1374.069941] ? vfat_rename+0x1bb/0xf60 [ 1374.070451] fat_search_long+0x380/0xd90 [ 1374.070983] ? fat_parse_short+0xd30/0xd30 [ 1374.071554] ? vfat_rename+0x1bb/0xf60 [ 1374.072073] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1374.072797] vfat_rename+0x3a0/0xf60 [ 1374.073292] ? vfat_mkdir+0x440/0x440 [ 1374.073782] ? lock_release+0x680/0x680 [ 1374.074293] ? lock_acquire+0x197/0x470 [ 1374.074804] ? lockref_get+0x11/0x50 [ 1374.075302] ? find_held_lock+0x2c/0x110 [ 1374.075843] ? down_write_nested+0xe4/0x160 [ 1374.076420] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1374.077096] vfs_rename+0xd6c/0x1510 [ 1374.077599] ? vfs_unlink+0x8b0/0x8b0 [ 1374.078094] ? _raw_spin_unlock+0x1a/0x30 [ 1374.078636] do_renameat2+0xae1/0xbf0 [ 1374.079133] ? __ia32_sys_link+0x80/0x80 [ 1374.079662] ? __virt_addr_valid+0x170/0x5d0 [ 1374.080223] ? __check_object_size+0x319/0x440 [ 1374.080878] __x64_sys_rename+0x7d/0xa0 [ 1374.081405] do_syscall_64+0x33/0x40 [ 1374.081883] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1374.082539] RIP: 0033:0x7f5abea14b19 [ 1374.083016] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1374.085423] RSP: 002b:00007f5abbf8a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1374.086400] RAX: ffffffffffffffda RBX: 00007f5abeb27f60 RCX: 00007f5abea14b19 [ 1374.087312] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1374.088220] RBP: 00007f5abbf8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1374.089175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1374.090100] R13: 00007ffe1e8b4a0f R14: 00007f5abbf8a300 R15: 0000000000022000 12:46:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) symlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000200)='./file0\x00') mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:46:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb69434bf8506d4c054d223c906d6b46732e6661740002", 0x17}, {0x0, 0x0, 0x1}], 0x40, &(0x7f0000000240)=ANY=[]) sendto$unix(0xffffffffffffffff, &(0x7f0000000200)="b0bbc2e408625a9abbcb970d8212c9d8e8e415039c5306d4612e49fb7e45886bf223c32f3e88457a736cd387ef17fc65e1f3aedfceee0067bad1137e71366e191cdef6275313f7ddcd122aac", 0x4c, 0x20000000, &(0x7f0000000300)=@abs={0x1, 0x0, 0x4e20}, 0x6e) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000000)='./mnt\x00', 0x0, 0x0, 0x0, 0x2200000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./mnt\x00', 0x101000, 0x20) 12:46:00 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000000)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:46:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000000)='./file0\x00') 12:46:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 10) 12:46:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 9) 12:46:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 12) 12:46:00 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000140)=[{&(0x7f0000000200)="4069f06579998e08f7d3f4679649cfeb9e7a11351ccd7bf7da28ab8a15fd7d2892589365901b3214639e16a5c75c3b9282a2154669d8e82f1d036eafb65cc482250cc979ceeb0431a74dc0544b0c2692a1c4679ebbf05b9e238cdb6dcecb28d127e957760c0d90e7c0f7df8cfb1d80f6fa588f96279de9ea63a07f90f2dea463dbe94842743a293abf74f438f3dc", 0x8e, 0x8000}], 0x813000, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0xa04980, 0x109) mount$9p_fd(0x0, &(0x7f00000002c0)='mnt/encrypted_dir\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1388.226333] loop4: detected capacity change from 0 to 41948160 [ 1388.228835] loop1: detected capacity change from 0 to 41948160 [ 1388.231141] loop7: detected capacity change from 0 to 65536 [ 1388.243471] loop0: detected capacity change from 0 to 41948160 [ 1388.247038] loop2: detected capacity change from 0 to 41948160 [ 1388.252984] loop5: detected capacity change from 0 to 41948160 [ 1388.268076] FAT-fs (loop3): bogus number of reserved sectors [ 1388.269024] FAT-fs (loop3): Can't find a valid FAT filesystem [ 1388.281858] FAULT_INJECTION: forcing a failure. [ 1388.281858] name failslab, interval 1, probability 0, space 0, times 0 [ 1388.283384] CPU: 1 PID: 8587 Comm: syz-executor.4 Not tainted 5.10.238 #1 [ 1388.284260] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1388.285352] Call Trace: [ 1388.285708] dump_stack+0x107/0x167 [ 1388.286184] should_fail.cold+0x5/0xa [ 1388.286675] ? fat_parse_long.constprop.0+0x8e9/0xb50 [ 1388.287339] should_failslab+0x5/0x20 [ 1388.287827] kmem_cache_alloc+0x5b/0x310 [ 1388.288381] fat_parse_long.constprop.0+0x8e9/0xb50 [ 1388.289015] ? vfat_lookup+0xeb/0x610 [ 1388.289541] fat_search_long+0x380/0xd90 [ 1388.290071] ? fat_parse_short+0xd30/0xd30 [ 1388.290611] ? vfat_lookup+0xeb/0x610 [ 1388.291135] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1388.291804] ? slab_free_freelist_hook+0x180/0x180 [ 1388.292472] ? find_held_lock+0x2c/0x110 [ 1388.293003] ? lock_acquire+0x197/0x470 [ 1388.293520] ? find_held_lock+0x2c/0x110 [ 1388.294046] vfat_lookup+0x2d4/0x610 [ 1388.294528] ? vfat_revalidate+0x190/0x190 [ 1388.295090] ? rwlock_bug.part.0+0x90/0x90 [ 1388.295650] ? do_raw_spin_unlock+0x4f/0x220 [ 1388.296215] ? _raw_spin_unlock+0x1a/0x30 [ 1388.296756] __lookup_hash+0x121/0x190 [ 1388.297258] do_renameat2+0x51f/0xbf0 [ 1388.297767] ? __ia32_sys_link+0x80/0x80 [ 1388.298294] ? __virt_addr_valid+0x170/0x5d0 [ 1388.298860] ? __check_object_size+0x319/0x440 [ 1388.299487] ? getname_flags.part.0+0x1dd/0x4f0 [ 1388.300087] __x64_sys_rename+0x7d/0xa0 [ 1388.300643] do_syscall_64+0x33/0x40 [ 1388.301120] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1388.301788] RIP: 0033:0x7ff983930b19 [ 1388.302265] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1388.304686] RSP: 002b:00007ff980ea6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1388.305675] RAX: ffffffffffffffda RBX: 00007ff983a43f60 RCX: 00007ff983930b19 [ 1388.306590] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1388.307540] RBP: 00007ff980ea61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1388.308452] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1388.309365] R13: 00007ffced023aaf R14: 00007ff980ea6300 R15: 0000000000022000 [ 1388.330889] FAULT_INJECTION: forcing a failure. [ 1388.330889] name failslab, interval 1, probability 0, space 0, times 0 [ 1388.332492] CPU: 1 PID: 8612 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1388.333411] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1388.334506] Call Trace: [ 1388.334853] dump_stack+0x107/0x167 [ 1388.335355] should_fail.cold+0x5/0xa [ 1388.335879] ? create_object.isra.0+0x3a/0xa20 [ 1388.336532] should_failslab+0x5/0x20 12:46:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x150482, &(0x7f0000000140)=ANY=[@ANYRES64=r0]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000300)={{0x1, 0x1, 0x18, r2, {0xffffffffffffffff, 0xffffffffffffffff}}, './file1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='mnt/encrypted_dir\x00', 0x0, 0x0, 0x0, 0x18b3004, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r3) getsockname$unix(r3, &(0x7f0000000200)=@abs, &(0x7f0000000280)=0x6e) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1388.337049] kmem_cache_alloc+0x5b/0x310 [ 1388.337647] create_object.isra.0+0x3a/0xa20 [ 1388.338211] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1388.338866] kmem_cache_alloc+0x159/0x310 [ 1388.339403] fat_parse_long.constprop.0+0x8e9/0xb50 [ 1388.340043] ? vfat_lookup+0xeb/0x610 [ 1388.344572] fat_search_long+0x380/0xd90 [ 1388.345103] ? fat_parse_short+0xd30/0xd30 [ 1388.345708] ? vfat_lookup+0xeb/0x610 [ 1388.346205] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1388.346878] ? slab_free_freelist_hook+0x180/0x180 [ 1388.347513] ? find_held_lock+0x2c/0x110 [ 1388.348046] ? lock_acquire+0x197/0x470 [ 1388.348582] ? find_held_lock+0x2c/0x110 [ 1388.349105] vfat_lookup+0x2d4/0x610 [ 1388.353644] ? vfat_revalidate+0x190/0x190 [ 1388.354187] ? rwlock_bug.part.0+0x90/0x90 [ 1388.354735] ? do_raw_spin_unlock+0x4f/0x220 [ 1388.355330] ? _raw_spin_unlock+0x1a/0x30 [ 1388.355863] __lookup_hash+0x121/0x190 [ 1388.356406] do_renameat2+0x51f/0xbf0 [ 1388.356907] ? __ia32_sys_link+0x80/0x80 [ 1388.357443] ? __virt_addr_valid+0x170/0x5d0 [ 1388.358012] ? __check_object_size+0x319/0x440 [ 1388.358614] ? getname_flags.part.0+0x1dd/0x4f0 [ 1388.359242] __x64_sys_rename+0x7d/0xa0 [ 1388.359758] do_syscall_64+0x33/0x40 [ 1388.360231] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1388.360895] RIP: 0033:0x7f4eb49c4b19 [ 1388.361370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1388.363759] RSP: 002b:00007f4eb1f19188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1388.364773] RAX: ffffffffffffffda RBX: 00007f4eb4ad8020 RCX: 00007f4eb49c4b19 [ 1388.365701] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1388.366609] RBP: 00007f4eb1f191d0 R08: 0000000000000000 R09: 0000000000000000 [ 1388.367512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1388.368461] R13: 00007ffdf23d638f R14: 00007f4eb1f19300 R15: 0000000000022000 [ 1388.369672] loop7: detected capacity change from 0 to 65536 [ 1388.374197] FAULT_INJECTION: forcing a failure. [ 1388.374197] name failslab, interval 1, probability 0, space 0, times 0 [ 1388.375847] CPU: 1 PID: 8599 Comm: syz-executor.2 Not tainted 5.10.238 #1 [ 1388.376721] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1388.377790] Call Trace: [ 1388.378129] dump_stack+0x107/0x167 [ 1388.378627] should_fail.cold+0x5/0xa [ 1388.379112] ? create_object.isra.0+0x3a/0xa20 [ 1388.379739] should_failslab+0x5/0x20 [ 1388.380226] kmem_cache_alloc+0x5b/0x310 [ 1388.380743] ? fat_parse_short+0x914/0xd30 [ 1388.381313] create_object.isra.0+0x3a/0xa20 [ 1388.381885] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1388.382581] kmem_cache_alloc+0x159/0x310 [ 1388.383117] fat_parse_long.constprop.0+0x8e9/0xb50 [ 1388.383752] ? vfat_rename+0x1bb/0xf60 [ 1388.384261] fat_search_long+0x380/0xd90 [ 1388.384792] ? fat_parse_short+0xd30/0xd30 [ 1388.385360] ? vfat_rename+0x1bb/0xf60 [ 1388.385890] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1388.386610] vfat_rename+0x3a0/0xf60 [ 1388.387100] ? vfat_mkdir+0x440/0x440 [ 1388.387587] ? lock_release+0x680/0x680 [ 1388.388100] ? lock_acquire+0x197/0x470 [ 1388.388612] ? lockref_get+0x11/0x50 [ 1388.389086] ? find_held_lock+0x2c/0x110 [ 1388.389625] ? down_write_nested+0xe4/0x160 [ 1388.390178] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1388.390843] vfs_rename+0xd6c/0x1510 [ 1388.391326] ? vfs_unlink+0x8b0/0x8b0 [ 1388.391820] ? _raw_spin_unlock+0x1a/0x30 [ 1388.392363] do_renameat2+0xae1/0xbf0 [ 1388.392859] ? __ia32_sys_link+0x80/0x80 [ 1388.393386] ? __virt_addr_valid+0x170/0x5d0 [ 1388.393965] ? __check_object_size+0x319/0x440 [ 1388.394574] __x64_sys_rename+0x7d/0xa0 [ 1388.395085] do_syscall_64+0x33/0x40 [ 1388.395563] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1388.396226] RIP: 0033:0x7f5abea14b19 [ 1388.396725] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1388.399128] RSP: 002b:00007f5abbf8a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1388.400101] RAX: ffffffffffffffda RBX: 00007f5abeb27f60 RCX: 00007f5abea14b19 [ 1388.401042] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1388.402008] RBP: 00007f5abbf8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1388.402920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1388.403832] R13: 00007ffe1e8b4a0f R14: 00007f5abbf8a300 R15: 0000000000022000 [ 1388.413366] FAT-fs (loop3): Unrecognized mount option "Þö'S÷ÝÍ*¬" or missing value 12:46:00 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x541b, &(0x7f0000000000)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:46:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./mnt\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000200)="2f73485a07617b3e87ec8325688d34277ac97bc39b2df6c4796f8e911ddfd8b14b98c9494bf4c69b62ad0cef2a39b74b463f7eb73c99c3f332c5e4f956a2fca3f0516a71d00d3aee04744a10d5af8343a954e5189059313cde2efae2dfbcfac270dea2031d82242e1cf0b244416de51d0805096170806240e224", 0x7a, 0x4f9eb751}, {&(0x7f0000000140)="d3eba6efbf859ca962e8", 0xa, 0x8}, {&(0x7f0000000300)="b117f54dc85565979889a3cda6fcf5902872a1ab3f9fed68167df3ae2c4fa6bc655a30a91aa565ac83f4408b69a265c19dc4572854e9e263d33213ef031d691af5b2b39a2f548610be863e9f83bb853c6ddd3df126b95e23843a0edb869c9c809751d877b683936cef6c5ed125b09105849c5a60b5e85a60749513cdeb52b98ae20888ad4d1538", 0x87, 0x40}], 0x100000, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000000)='./file0\x00') [ 1388.483610] loop3: detected capacity change from 0 to 135266304 12:46:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 10) [ 1388.539059] loop3: detected capacity change from 0 to 135266304 12:46:00 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000004500)=@IORING_OP_READ=@pass_buffer={0x16, 0x1, 0x4007, @fd, 0xcd000000000, &(0x7f0000004440)=""/189, 0xbd, 0x10, 0x1}, 0x3a) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003880)=[{{&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000300)=""/84, 0x54}, {&(0x7f0000000380)=""/65, 0x41}, {&(0x7f0000000000)=""/28, 0x1c}], 0x4, &(0x7f0000003a00)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000001e5461170f094250222dab6638b88330f57a0a98e8dd96ae3bad72b3336aff15911fb3c4ec1616afb080409de28e41b0272c130251e5ef313cc05d6633a69918558ad8d7a98d5034d2e230162fb67e5b9a7a0d686d6ec", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="14000000000000000100000001000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x100}}, {{&(0x7f0000000400), 0x6e, &(0x7f0000003780)=[{&(0x7f0000001600)=""/107, 0x6b}, {&(0x7f0000001680)=""/79, 0x4f}, {&(0x7f0000001700)=""/4096, 0x1000}, {&(0x7f0000002700)=""/99, 0x63}, {&(0x7f0000002780)=""/4096, 0x1000}], 0x5, &(0x7f0000003800)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x80}}], 0x2, 0x40000000, &(0x7f0000003900)={r1, r2+10000000}) mkdirat(r3, &(0x7f0000003940)='mnt/encrypted_dir\x00', 0x8) r5 = getuid() chown(&(0x7f0000004400)='./file0\x00', r5, r4) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r6) utimensat(r6, &(0x7f0000003980)='mnt/encrypted_dir\x00', &(0x7f00000039c0)={{}, {0x77359400}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r6, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {r6}}, 'mnt/encrypted_dir\x00'}) openat(r7, &(0x7f00000043c0)='./file1/../file0\x00', 0x80, 0x188) sendto$unix(r6, &(0x7f0000004300)="6013362cd6938c7e9a308ce2b1043feddacc3b08f3842dd4130193ae8ddee0323cdbb80cfc1735d20185dd588a", 0x2d, 0x4880, &(0x7f0000004340)=@file={0x1, 'mnt/encrypted_dir\x00'}, 0x6e) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') chroot(&(0x7f0000001500)='mnt/encrypted_dir\x00') syz_mount_image$ext4(&(0x7f0000001540)='ext2\x00', &(0x7f0000001580)='./file1\x00', 0x1, 0xa, &(0x7f0000004200)=[{&(0x7f0000003b80)="359673e4aa7937a2b48bc32c3a1bf926d2b6da155041c3121386d844c29a5d422d5b55029c91c767ecf2f17ceda00f088fe4fb873df6a554a7170cac649de3dd563696cab32439691904ac89ff09a2e389b93b1cd6af3c481b54ca619344002956b8f6cb5883502f42afb805514a30b33cea00996180d8be5cb79049fb7feb5356364884ad97", 0x86, 0x3}, {&(0x7f0000003c40)="6adc3c2d31eb1b0edd38073db6f5b49c342ba2a42b25c8db36e171ee7b29e1679c541e58600dfe1f9f2293bf3bb31b2637a8c9eb7eed032e17b493d7a2bc46ca37bdf9237e0aa079e51238a8f511b6160cca0b2efbeec5641708c62b1513", 0x5e, 0x9}, {&(0x7f0000003cc0)="a7c3e0f39eb10a64f6615dcffbffa48418f3568485937ca55d54f7ba82982ca5350a489c756eb1de041491a59342d2709ce100148c85ae558dd0659964843dbd77143e810e427a8cdb03425aca88f81ec57e0cb04f4a2475f2b69ed17b60d97419302eb85b58e91f43fcdd2d3ee3448760970a2d5fecf3dc9130998d71d3b4a7c9eedfd3f3ec80f85dd733d262a2fbca96d50f57fb0dcaf47f637c871bc68e6166208a1d1328e2dbcf462154626edd5411fd54bbc4ce", 0xb6, 0x2}, {&(0x7f0000003d80)="bbbdf810c023e743699f0521c7142b364014601d9fbd57ac612c756ea7c4b9b1e23c06056d370690b0bf8556944f434f99312e3e828a0001f87fb965014b3b0fece6e45f7a4e", 0x46, 0xaa47}, {&(0x7f0000003e00)="b3dee9de73d24cafac46b2b8c3c8cb0303ad6341d87186f755accb7bb3eacd4e9e02087074d922ce1c3f599cea95f2c266d3d29748e6ce342585dc63bd34cd1167d9f89cab3350dd56638a54e592b7228c27e6810349ed4b166808e0e27857b1f64c58c3a9655b10e3ac4b7e17d75411991f9cb0d9cd407373cc2154", 0x7c, 0x2}, {&(0x7f0000003e80)="6680a63bdfde72754a7842daf286f752d4ccb4aba225d7a1e300606471fd252b1a44c3862d2c8f65cf4fc337eb281870e7ac9004df2235a502ed95779d74b3c4694473168518580a721245de722b14fa7f1f95160818bcbe6927b00d0819858bb305c7827bcae9fdb5ff2b807dcb1d494c5fc2073eae756e023576deb3180cad3bb02f0915db90b60b3d384660ddc0dc097e95650beb6061d8f06c91b682f0b192598c045e9911f396b3", 0xaa, 0x400}, {&(0x7f0000003f40)="12cac32df56fa9b4a120be559937af51acf949388f9988801080c70f9dd98f49e45a414dc4e823e0915ba7a51b3d0588dd6af174bdff9a651083562c57a15f1ed40ceee7c1dd23ab1a268136009dc56552efc9019d86ed2f7b0d5ca71ee9e78fe9b66cba76b7a442cbd3104b755e851bffd017188d3fb47cc03de516555ad29f1b6f4c708b43fd", 0x87, 0x5}, {&(0x7f0000004000)="150c7df7bcb3653e8f5f692c453da2a43c3760977e752f3e4474e7d93dc2ea09d61aa3e0fd971f3bf042769c6980a515d019f065579a2f1e0a629a5dd1dc1a9d08239073811d1e02517c329cab28cdd022f498a81bfc58cb3673785ac1fb6099612af7928159072592a14fcebd885ee998e93dc4e4f0a643d903", 0x7a, 0x4}, {&(0x7f0000004080)="567f9284292f40abb8a087051ecfe7cfd6b113ceedd972c190fdc45fb1ee10abdcf991a1f40687b0eee495090ae6f3ae8b803217bcf071ea67b4ae865e9ccc7a81edf04b4784ab72166e81f954ce498493997874a5655abbba40e3e75444c91d386c3f19f70e5b4a5c6457fbf7cd79a7736716381ff870b70c2db78a3ed9febf2e", 0x81, 0xb9ff}, {&(0x7f0000004140)="0f3988485580f1c4dd07303560fe9936f0a3224a78173e09f3bfa7811f676ed18f96b6be82bdc8b89e7b209c55b474c1959ae9d957461df4bc6a7fe2424dc27542c4c62e0c03b3a9261f0b98c81aa64f70921144397ab100266f6a1015e5a46fbb7a802f7733104e40c32fd6a0a96853483c64b11b6407ade1a6a56f5980d53368588af189952d07f22b65b7896bb994b3598017d9ec8da384f816ab", 0x9c, 0x1}], 0x200000, &(0x7f00000015c0)=ANY=[@ANYBLOB='init_itable,acl,nobl,nodelalloc,bh,nodelalloc,\x00']) 12:46:00 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000a00)='./file1\x00', &(0x7f0000000a40)=@known='trusted.overlay.redirect\x00', &(0x7f0000000a80)=""/220, 0xdc) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) pivot_root(&(0x7f0000000200)='./mnt\x00', &(0x7f0000000240)='./mnt\x00') mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') openat(r0, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x200, 0x2) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000300)='./file0\x00', 0x3, 0x8, &(0x7f0000000800)=[{&(0x7f0000000340)="3040acc3c2886b2061cc88016b2488afb4a093aa8a172ae38466bd191ba9a5ffd967177fcd5802b6efa7024287815f2d6a1eece3eafce5657eaf4913510ad1026746693b116c288e3f35d312db3fc97d8115c185145d762e33d6c6737394d8f5403d46bd076d4c9719a94911ac41ad2ab96e388faa", 0x75, 0x2}, {&(0x7f00000003c0)="b2cdb89a91b403600bb30c349f5b0818e33eb0bf92fff64584b6748aa3e04fae094bed04beec570f292f27accb8d3b4c3e23e49f8167eb9c7c26fd04c2fdf4393419806810690fac38f16d9bd9d31e83d535583e9f6729fb5135c10b45d7bb33d4e36817e2d40c6d25d984119f7181b786d8f5a1678248f44a21ce52b08644dcaa0add4906d568a98b62043e668e518189c559c14706f826c31a5b6ac2b40c323d55857fe4dc89cc9be28d2912fc03f9c73bc05ce62163e27b46fc901eb4591ce28432031e3857a496cf4a7f90ac3adf1fb2f36e5177e1dca63ca60179bebfc0f0bc", 0xe2, 0x6}, {&(0x7f0000000500)="18e0830c9308c2de9558ae", 0xb, 0x6}, {&(0x7f0000000540)="d9047e24323cfb6fba922f388e6e1431d4b6e50363e5249be8af9ae982258a767dccf6d20a7285d1f894b5f21ffe91c7a704f5c8ce1c89f84f19c2971cfd1af8e4fbf9342891c5361b9a28c8f625d2ac71e532f4529ffa463a1ac5afc6", 0x5d, 0x1}, {&(0x7f00000005c0)="5e032e7b65b04ef8278627299d9248ff34d985f8", 0x14, 0x1}, {&(0x7f0000000600)="3f3582fb625656e3d20bfc09db7d22d4c211f0a74bac7c1a74c9b311233432482e3aaffa3fdc0a75d485681d608a8d7fa8ed26929ea0e19a08da1918e5f5de902884aabd1d527b619b890b7ea5d620", 0x4f, 0x7}, {&(0x7f0000000680)="495ac8952c5894583818ef8fecd64fc29e9a2824affe3ba365115c07cd02bf2be4796cd6abedcb557936fc65e9c9ac236c839432169e98f32eeda94d8106c0abb49c29d9d87e12", 0x47, 0x5}, {&(0x7f0000000700)="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", 0xff, 0x87}], 0x208000, &(0x7f00000008c0)={[{@data_writeback}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@permit_directio}, {@appraise_type}]}) stat(&(0x7f0000000940)='./mnt\x00', &(0x7f0000000980)) 12:46:00 executing program 6: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r0 = fsmount(0xffffffffffffffff, 0x1, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f00000000c0)={@local, r1}, 0x14) 12:46:00 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(r0, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x200bc2, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x6, 0x6, &(0x7f0000000580)=[{&(0x7f0000000280)="1926ce785072ac65ad835dd81de771f17b2810ca2550bdce4f", 0x19, 0x3}, {&(0x7f0000000300)="2f78717eb9ecc1af24fd672321b5989246389734a8d19b74e213e59af4f0d971c127d58852faaa96413b98be7fc6b8dff8d28d9ae9629f64d745b5e33cee2774825ce073ebc291bd40128d503eea808d461ceb2a81d1d01b764e2aab66233e5b4c5918d8bd4897bd25640c140f6e2a2cffe9a049ae693e60373b3e3f72e207124acc303ffe3c", 0x86, 0x10000}, {&(0x7f00000003c0)="2ed981d3cdcb2055dabecbd07221a20b1a641d470363dbd6b854ffdf456b254e9a262909fdbb0a624aef74e7f818048f0e3ff2f390a1c462a55b653b61a071b517f754f9bda560c501c30d27f5ef9c779c2ca8747c5ee83c23fc71203ed13f82627faf7be78fcf04ac971e30bf1b381e1d9d5a97dce8", 0x76, 0x7}, {&(0x7f0000000440)="6cc6fe31f05a3cf0c9fe8972f976ef3ba97835576d8c461456c632abf971534e8a596a72ffca1fa87cb991f3652cda13d0b4e2865aefacb54573", 0x3a, 0x5}, {&(0x7f0000000500)="a27f43a696bf7e899089eef8d2952f6685535975763aee9831882ce0f8733775e0f229607d0065981294a3e3b706d17cae2a1a879d0d2c251c37098809622897e9ef14a3328d281f8a37eb1945d6ab01d57e1417c3e4744d5b12337f21a6b9ba631745439fdcbbf89bcfb2cf0902769089f33d0b9653", 0x76, 0x40}, {&(0x7f0000000480)="e0d70ba21b79a3a331", 0x9, 0x1}], 0x10000, &(0x7f0000000640)={[{@nodots}, {@fat=@nocase}, {@dots}, {@fat=@dmask={'dmask', 0x3d, 0x7}}, {@nodots}], [{@dont_measure}, {@smackfshat={'smackfshat', 0x3d, ':@'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ']]+!]-!@{^\\@\xa1-\\$'}}, {@fsmagic={'fsmagic', 0x3d, 0x743}}]}) openat(r1, &(0x7f0000000700)='./mnt\x00', 0x7912c0, 0x1) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:46:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 13) 12:46:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 11) [ 1388.642576] loop5: detected capacity change from 0 to 41948160 [ 1388.647006] FAULT_INJECTION: forcing a failure. [ 1388.647006] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1388.648794] CPU: 1 PID: 8634 Comm: syz-executor.4 Not tainted 5.10.238 #1 [ 1388.649734] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1388.650808] Call Trace: [ 1388.651151] dump_stack+0x107/0x167 [ 1388.651622] should_fail.cold+0x5/0xa [ 1388.652116] _copy_from_user+0x2e/0x1b0 [ 1388.652628] kstrtouint_from_user+0xbd/0x220 [ 1388.653241] ? kstrtou8_from_user+0x210/0x210 [ 1388.653837] ? lock_acquire+0x197/0x470 [ 1388.654349] ? ksys_write+0x12d/0x260 [ 1388.654850] proc_fail_nth_write+0x78/0x220 [ 1388.655403] ? proc_task_getattr+0x1f0/0x1f0 [ 1388.655976] ? proc_task_getattr+0x1f0/0x1f0 [ 1388.656538] vfs_write+0x29a/0xb10 [ 1388.657006] ksys_write+0x12d/0x260 [ 1388.657484] ? __ia32_sys_read+0xb0/0xb0 [ 1388.658013] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1388.658686] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1388.659350] do_syscall_64+0x33/0x40 [ 1388.659830] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1388.660486] RIP: 0033:0x7ff9838e35ff [ 1388.660963] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 1388.663330] RSP: 002b:00007ff980ea6170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1388.664337] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff9838e35ff [ 1388.665294] RDX: 0000000000000001 RSI: 00007ff980ea61e0 RDI: 0000000000000003 [ 1388.666224] RBP: 00007ff980ea61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1388.667166] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1388.668120] R13: 00007ffced023aaf R14: 00007ff980ea6300 R15: 0000000000022000 [ 1388.680187] loop7: detected capacity change from 0 to 41948160 [ 1388.683459] loop2: detected capacity change from 0 to 41948160 [ 1388.693689] loop0: detected capacity change from 0 to 41948160 [ 1388.756949] FAULT_INJECTION: forcing a failure. [ 1388.756949] name failslab, interval 1, probability 0, space 0, times 0 [ 1388.758659] CPU: 0 PID: 8647 Comm: syz-executor.2 Not tainted 5.10.238 #1 [ 1388.759638] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1388.760884] Call Trace: [ 1388.761281] dump_stack+0x107/0x167 [ 1388.761853] should_fail.cold+0x5/0xa [ 1388.762420] ? vfat_add_entry+0x23a/0x2720 [ 1388.763054] should_failslab+0x5/0x20 [ 1388.763576] kmem_cache_alloc_trace+0x55/0x320 [ 1388.764277] vfat_add_entry+0x23a/0x2720 [ 1388.764893] ? find_held_lock+0x2c/0x110 [ 1388.765489] ? current_time+0x72/0x2c0 [ 1388.766089] ? vfat_rmdir+0x460/0x460 [ 1388.766631] ? mark_held_locks+0x9e/0xe0 [ 1388.767243] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1388.768063] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1388.768758] ? trace_hardirqs_on+0x5b/0x180 [ 1388.769454] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1388.770208] ? ktime_get_coarse_real_ts64+0xfd/0x190 [ 1388.770955] ? current_time+0x1e6/0x2c0 [ 1388.771604] ? igrab+0xc0/0xc0 [ 1388.772170] vfat_rename+0xbd9/0xf60 [ 1388.772685] ? vfat_mkdir+0x440/0x440 [ 1388.773744] ? lock_release+0x680/0x680 [ 1388.774366] ? lockref_get+0x11/0x50 [ 1388.774941] ? down_write_nested+0xe4/0x160 [ 1388.775529] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1388.776316] vfs_rename+0xd6c/0x1510 [ 1388.776891] ? vfs_unlink+0x8b0/0x8b0 [ 1388.777479] ? _raw_spin_unlock+0x1a/0x30 [ 1388.778134] do_renameat2+0xae1/0xbf0 [ 1388.778664] ? __ia32_sys_link+0x80/0x80 [ 1388.779278] ? __virt_addr_valid+0x170/0x5d0 [ 1388.779948] ? __check_object_size+0x319/0x440 [ 1388.780354] FAULT_INJECTION: forcing a failure. [ 1388.780354] name failslab, interval 1, probability 0, space 0, times 0 [ 1388.780621] __x64_sys_rename+0x7d/0xa0 [ 1388.782632] do_syscall_64+0x33/0x40 [ 1388.783224] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1388.783971] RIP: 0033:0x7f5abea14b19 [ 1388.784526] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1388.787222] RSP: 002b:00007f5abbf8a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1388.788346] RAX: ffffffffffffffda RBX: 00007f5abeb27f60 RCX: 00007f5abea14b19 [ 1388.789368] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1388.790401] RBP: 00007f5abbf8a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1388.793847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1388.794891] R13: 00007ffe1e8b4a0f R14: 00007f5abbf8a300 R15: 0000000000022000 [ 1388.796002] CPU: 1 PID: 8655 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1388.796891] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1388.797969] Call Trace: [ 1388.798344] dump_stack+0x107/0x167 [ 1388.798813] should_fail.cold+0x5/0xa [ 1388.799350] ? fat_parse_long.constprop.0+0x8e9/0xb50 [ 1388.800015] should_failslab+0x5/0x20 [ 1388.800505] kmem_cache_alloc+0x5b/0x310 [ 1388.801032] fat_parse_long.constprop.0+0x8e9/0xb50 [ 1388.801690] ? vfat_rename+0x1bb/0xf60 [ 1388.802232] fat_search_long+0x380/0xd90 [ 1388.802760] ? fat_parse_short+0xd30/0xd30 [ 1388.803346] ? vfat_rename+0x1bb/0xf60 [ 1388.803872] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1388.804548] vfat_rename+0x3a0/0xf60 [ 1388.805053] ? vfat_mkdir+0x440/0x440 [ 1388.805569] ? lock_release+0x680/0x680 [ 1388.806077] ? lock_acquire+0x197/0x470 [ 1388.806626] ? lockref_get+0x11/0x50 [ 1388.807103] ? find_held_lock+0x2c/0x110 [ 1388.807634] ? down_write_nested+0xe4/0x160 [ 1388.808188] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1388.808845] vfs_rename+0xd6c/0x1510 [ 1388.809360] ? vfs_unlink+0x8b0/0x8b0 [ 1388.809867] ? _raw_spin_unlock+0x1a/0x30 [ 1388.810453] do_renameat2+0xae1/0xbf0 [ 1388.810951] ? __ia32_sys_link+0x80/0x80 [ 1388.811486] ? __virt_addr_valid+0x170/0x5d0 [ 1388.812060] ? __check_object_size+0x319/0x440 [ 1388.812667] __x64_sys_rename+0x7d/0xa0 [ 1388.813174] do_syscall_64+0x33/0x40 [ 1388.813654] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1388.814312] RIP: 0033:0x7f4eb49c4b19 [ 1388.814791] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1388.817127] RSP: 002b:00007f4eb1f19188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1388.818110] RAX: ffffffffffffffda RBX: 00007f4eb4ad8020 RCX: 00007f4eb49c4b19 [ 1388.819019] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1388.819928] RBP: 00007f4eb1f191d0 R08: 0000000000000000 R09: 0000000000000000 [ 1388.820836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1388.821794] R13: 00007ffdf23d638f R14: 00007f4eb1f19300 R15: 0000000000022000 12:46:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000200)='./mnt\x00', 0x4, 0x8, &(0x7f0000001580)=[{&(0x7f0000000240)="4ce7e67c132faa82a293de9e8d686a17565d", 0x12, 0x831}, {&(0x7f0000000500)="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", 0x1000, 0x3}, {&(0x7f0000000280)="5c1c8f5e36d26cb34f854347ca392d909cc3a20318a8da622cd6111ebe9b758fdca0548ffff80f0c4d3f80feb71b85026d5614e0f961a3", 0x37, 0xfffffffffffffff8}, {&(0x7f0000000300)="2149516385f8bc8732b44297e1e547cb759b67fdad01d4a4072df767", 0x1c, 0x5}, {&(0x7f0000000340)="dd53a0a0b887502830cf84529f96e2565b9d56617c0b2d6aa23e10cffc127315603cd7c565fa426b23994b86da78b6efccae899c4092fe11ab9b15a11ba849b05cc95362655618acfa89d89e853c95c4f1d4cd94ceeffc80ee163779935be3b33de6c6be22ea6a185dbb470b04d02a5934e6a5368cc8dd3a1af459be11f0199c73dfa5d4b2d5462d8d828d6abeacad1aaf69adcded6ecb1400a1982f0e9457ee67a11659eac6ac07b22257377b2002fae5b17626d83a84df31d2c6e6e724dc6d1ae5499e5c827c133d08c1bcf587e2366b0c8f25e82ea35e8b8da8b499413888aa0a33e2dfc207832d3bb4b712408bd750bc8f", 0xf3, 0x5}, {&(0x7f0000000440)}, {&(0x7f0000000480)="76c77ec5175a4cfe953287324e7c8750567a824d22c9f6e2a0bc024c1baea07d14", 0x21, 0x6}, {&(0x7f0000001500)="6afbe4138ef1b1caef7ce4259f7048de7503f4afc4b5c4bc85da97c149fdba71eb811ff98f360a170e5d9516e5ca9615e7d59ec07747947b7e23fda4950a32b84853e1df54f9968e397e08bace6bc116fcebd6aacc7bee1d423e82872f008ccd7337b7", 0x63, 0x2}], 0x2800000, &(0x7f0000001640)={[{'-'}], [{@smackfstransmute={'smackfstransmute', 0x3d, '*{'}}, {@obj_role={'obj_role', 0x3d, '\xab['}}, {@obj_user={'obj_user', 0x3d, 'vfat\x00'}}]}) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000001680)='./file1\x00', 0x80c0, 0x88) faccessat2(r1, &(0x7f00000016c0)='./mnt\x00', 0x8, 0x1200) mkdirat(r0, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') rmdir(&(0x7f0000000440)='mnt/encrypted_dir\x00') 12:46:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000003c0)='mnt/encrypted_dir\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1f}], 0x0, &(0x7f0000000380)=ANY=[@ANYRES32=r0, @ANYRES16=0x0, @ANYRESHEX=r0, @ANYRES16=r0, @ANYRESOCT, @ANYRES16]) r2 = syz_io_uring_setup(0x6f87, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x3}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) syz_io_uring_submit(r5, r4, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) syz_io_uring_submit(0x0, r4, &(0x7f00000000c0)=@IORING_OP_FSYNC={0x3, 0x2, 0x0, @fd_index=0x6, 0x0, 0x0, 0x0, 0x1}, 0xffff) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r6) unlinkat(r6, &(0x7f0000000000)='./mnt\x00', 0x0) r7 = openat(r1, &(0x7f0000000300)='./file1\x00', 0x42, 0x164) close(r7) syz_mount_image$iso9660(&(0x7f0000000200), &(0x7f0000000240)='./file2\x00', 0x6aec, 0x1, &(0x7f0000000280)=[{&(0x7f0000000500)="aab19feaf23b3e6dbb0c58ccc3d5aa501d3f071bde98e14ce24eadadad0fe45f79e59f52c9bc62a18741944db0b52a225eebd7dc392832fc99e1d32485cf19606cb469abcc2d576311348a6f7c57324a207b0050aa6a8fd61548a2617b54c7804b7ea2d8ffb9e9b5c901d4bd5db69e6035c4b396e2703014c4654c907cb879d3ca976d82a65ff71191ba47040bcfdd456992501579176d6a070541bd9f0e949ef36c4c3e9619d90910f11a4249b8d6f346d1b4c73c5b5b63f147db9bce07b7f35f63328b85a88c2d196ad7e83fe554ea303266939bc26a3892602a3b3e0853be2bd9076ad533ebc13a77a6bff56dbe2536139cc0c1683683c5ac7d232bfb6ce632fe7be5be4a0b5732e35238e05a218937f4b558f0abc53086879796c9e676cc4e67e084101579aa1e618c19870efb4e79328fda812906ba3579759aa0c4babb0c0d9e566300a4cb362e032497b2b76d117f418b66846d7c4fa2d4368f3293bb568d7dfb2e791ff37fa7db165c25b0dad23c7c02db3405a5ad3e3a59c2363bc665e2014f5a2f62ec0f50308763e58a62eb11d0bca3a7cb06ec09535a7c8329d4741e3ff174568a7e74c1f0972fd61a0605e0583e722f472947bc55a2bc2a21e9e89537c8dea146170c12021a79653f4bb903ae41475a1bc668d8c280d59ca759d1bf498d7abfe1cabf48e6b09f42d56ba8d173c5208e89ea1c0005f956275f480e872e914f4ee9c693f78e54e1cee460b076724e589fdf48f019afc1c43699cd4819d89a084cacd834ed9417719ef185635760f21ab4045e63565edc2cf7d515f3fb5f46787bb06f368e1c500db3528f2b6ff4093d6b912c12d2de417fe7fc611eb16a33c7a5f12888a86e980c3982b0fb5da95b9410c501422d548925408529bf728f46bf3dd58de7428beb0eec599ab13dbe3a788c2cfbcee275b5577d45f61755bd9ce9fa0bdd3b7778cfb2afcd4a4f746ee95c042da0c716236becf6566585a7b957f75be4102a1b7ab2585b8b57ad9c2b19380eb50a7d59a27fd2f3380ae2278554a13e6bac80b0dccd4fb2e211ec22d4c2a4e729e8d0010585bf34e0c8d7f50f09defa9899dc36424eb12d1ba619c24f6aecaab2db0d6f935d5b99c144c4e201f8f7e5cdf9b3c801eea61920ca00aead735d73853f395f29d320c55c1d5f6ac2362506753ed509165349eb1c0b298fbb20aeaffe751cb3b1474b7a9a848da755b35348c2c310640abe9ca1703356d4095ade8cd578b0203f377e8306d117dbe2b9710ebae463cf46db97208ffe5c4e4c1070c5f80b075ddd2cafc8a865a75094223b1c576329d2070c680eea567558e1232156775b7f10ae0802456a24d7cd709d627cf8ac47a32d7f919cd029a101aa948bfd01924e64743ce99421f13aafec85499afbc45bade106645d56241bb2e328fc6c4558b5d40b59507986562f2b1449192f669daac098345bd93ae6a82f3381392623df5531d9fe78d316043b508b2d0c33c2bfed10890cc29be47b477224485312ab35d17548d68b4e72f289493c28333e3d44871f0fc815f53004eed230e2c4aef0913eda026c7ba9332b9357200b6f9875916dab0793152fda4afa00f6ae533390b3dcbf26cff5356eb94d2f6f12a78b650a664538b1d570086a2878cdfd6d756c1d3ac1ab73d36d3582fabb95c48b20352f9923adeadf0157d3d59c59d18ecc496a35071487f364700908e08ba8c8137f0004eda8ba4184f66582802805ad287e3ada9c2c52c016c68f9b304869d1618be9d5da4f8328422ed32ef9ea65127596caa7d0633883a9536d79d94fcd23084a80cf2ea3bd081ec3d6cb9e15714d46d02eb4cd2b842bb23ebf8e62862bdc1e364dfbd0e43259032ac3a0676ac43cc23e3f1890905c00fba5c7a2ccc6c587bebe2ce6ad4398886e5f5e145d0be1105c270d458da5cefcf6be08fafddc0fdc5c48ccc88029b499964f4deee2c20db5227483010008632cd7749f2dfcf8ee93202d447bdeadcce815006e68faa3cc862cca9f698f185876328d68d4ebaef203e2b441275015f45ff0795e12b5dc44738a9651e24b6af9647986e57b2a4fad1a509059cf40c6b0286498c7de123b6a349e8b30204325263d47560d4064399a13680ce1092178c473501522dee841b82fca6c9246b206ff4cd0a7d623c31c258169d9bf9dafdccc466e00c9c55afc70239a63ca907d36a50372429ba43b3c78ed45f318d1e24dbd20fbdce0c139f61229deb085b2700ccdc67bf465738dedb35f388799edf997f4b95620c17a86f5c332cd177400f10693110fc48f8a29a6241177fad1cedec201a737dd67372d7e1535003c9efea17fa187af9a8b9e7a10ce4177e161938b0ccbff1053bb1151444b003f56feb9c3b5381b5b0789b7a523d60bc37152be79582e4ea6367b3a05cd73a1f474f21c29bd919d931c0cb533c04bdce91c03fdeadf80293fc380e671d8a2e1ab046d19f50fbbe6961ee5f64d24e2f59aa9f27559f4fb9745b17f860d62a7107f8547a3b4944c31a8d30fde73accdd964f905b5f49de501a4a47d727d94aaf2cbd40ec7b136d031b77808a95103c583a39a68b83938782af9d8c51ccd40eaa16b80cdb5fd340dd3e78b78110aa2c873b4c7865f02f33510f54e235e5df2ff29f5022e6951321a9e0dc39a9ac95318cb7d4de6a2a4af0fb2d5e6902da09af46be2a5af9efa62eeb3e6f76bc9be595b336b4e376ee3d3d9a5b2733bf2083e4c907fb7faf224e70dc7a4d7f687d717cc0abf6c3cacfc5b3da67aba1ce7c386333332d1b7e0644755250caf31791614aacfeac13d7345de5628ede00aef7740766d506c1d03054e0b589ddef17cde5f6cc20eef7f4bc7c2f8d1e60586e0991aaa0ec03912828eb16b2d24ae866a3400668ac4c1ad98b9a9f33caa07e5c5bab720576fb6dc5120ed025f87891fa7c22aaefb8225a34f8e615e35c97e561be5bb37640fd3bbabdd5f75c08107182956675452ae4d89ee2ec1a75de80a696052c3d292df470e3966013f06b8cb71e67b83746902b49fdd461d79899fd688f5973a77b32e47de64d949b381f5708acc6a1987395efb7691ebb783e98fc7b9a4bfd1823ae4f000a77ab19a549a17e6c9e0bc9d841819a5f48918a163e866517c7d9a499921336c2db3906d4d6b0944458ee898aa2d039f95a265ef8c0273e65ef82c49aa0c88c0def3e76506c3787e84ff4682ee4fb200a810d14d1cab58f042c12a60ac180da9430000dd53d970bc2b0370256e8012f88bdbbdff1164a0e88b38a8a25afeb7ddd6554a468658b7bd18850694097373b3c730a1164223076f9180640c59ffef3e995f4947f553ae75a43fc7b0d20d024914a0d9f6bb72008e268cfd77d3d8f5f13d837af25030f7e8dd0d1f9c368ce5fc03d64c02e3aa353eee7b25753f3d117c5114164e3002a880d9f85cbd1a4e97ff189c5174ad59ba8c570c54baf3ba2bb073c6f98a6a7508d8c347884537026a50029bb0c190a3be7643bbdfe592874682f626a4b7ae2682001bd09566c6e708d610dcc2424234fc37e5e082537b4fdda299f89018d6846e3da5b8535fb4f843f7a3b2cc8d1779fe6b87c34cd701a649a424901d98f2f4a1e0c75a8d341f1855b9a59f3ea7570df6587fb237a3574037f35cd330e20cc19519ffa0e2788d1b3b2a23b4ac72346762a73559fc74e5759077b9153cf9b32014844ef1ed271a497f3b055b571b2efada8f0fbeead6710b2084d7c60b071b69f86bc327f2873c95858daae777b69d5816bca3952d760ced69361df1d8ab8a6dcadd00192a20f864e1610ab2734c18af59c3659530c1cded0943dc771211f5b572e4e2bf60a76840431ade356e577275df682a87191b247e11a4b604dbb6795b14a5f1c72f48e8472724c9149f2e5785af7797554749950dc66db05a904438b2bec8a1fe67bcb176c66f8d517c7aa89d3d13fc773a8e44a5f9eb72544d21282f60c84b4360d1ef1a4b3d2e3d31818058461e5d62a327565384826c360c8c1361523ce6684be1d15be0cc96c1c3bde580a7f4112ce98d8415dc1a1d0a1ab235ace5e7a67bdbeac3977538878a6359a50c10574578519a4027f2c23c0538abf49eb706927fe459568403ac6094c61d6bbb5284a36bca4c86f3725ce3f42efe0e55152e42a92937e980a13067bf071acf91dd5c5e65258420e8a27ac054fa68a0c625fd032d4602cfcf371ee3b66ecd83f6439870e03634805e31819d5828bf886a5dbc75492450a70a7b147a0307be61af9a0320173c6f86fac37838e063cf30ff05896ff41361972c0cde0a01ce3d9df23f16d5f6b95b76dd26393587dbe7f0b075015a85bc7290aff6fc862215ddc4e6a6a4832b29f359369d4263d2f4e0a7035862eef2c86a0e5f2a955f2f794ec00f98381c69bbc631aefd79c527da994153bd4dac658b9d86c70c7fcdea98322b34186caaf352dc910c3c99c9a523554d47ecd8b1d3ad71b296e197627aac90b9eaf637b8c9233c998e775f7f9077d2de01d4512486e35768c21e96118f67626571fc4a873f1e0fac7af75a46a3b8bb3be4162c4d4b8d40cd9f23a8d6186f29637a5635bcee03b70def540ee4efbd8a377c6106c0626772c906ebdb68140fc5179e270051a3c0303e1141990553ae912c2b8c9a1d4a3835d3685bcd2bac2c7b7f89c36b1ea0b6e14fa06fe9561c13c4f20fd622d5359e219bbaf7056fa4de4e5ccf19a08974a0e0f0a153ad0061d88f39d98c986bb373123b805a665602004c65577af0b8353c5e78d5ccdaefef73b1017fd73a3784266c3cf71d8bcb41a183377f66bac5e7f3d04380b27fd31a0bc0618cfc63b00bc542f7dc4a6bd7fa26a4ad9466493b55fa04c537184dce6e06bff10c26dd9f04abf4977a5b0d21434e5c5286f6e67d0e14676d44dc3ba12c419d0f4b59a3c56229e2a722b37ee5a9fd5ec84c3b5ba59ee5cd67bf6160ae0ec464c81b80e8b4a0475a3b119bb5a3aa0d2945890104718aaeed663c62cfd096121d1b2dcc69aa7bdaaab1df41a8580d6e7e230a88ea0043ce581e76e21c212514cc42a487c69865a285b186bf53a0c5ea97ba35a846020c6a1e7fcd3b955e976366b9b98b8feaadc548eb6cb5cdb00720393ed3ddacafa823fa0cfef89346b9d2314b6ae1eae5cb97d38a85b3d7dcbe2c10a34195ac30f0df9c4963315312a6289234ac81c13f8159837f3a7c39a1e9f8d0a70830808fd9fe1e78951fad3dcbdacea706f6543c04bf0963efcd787d47bdc6cf894443465acadca295f42034fbdc90af0fd4a24b09ac9a2f7ac3aa26395e6dd227b80496183fbbeee3bc7c2309ff4ba6b425ed2f521098634956c4da5b9f7d4fbf5239b2d8dce1e8b2701b451b7deb2b1ada268a55e117af84d2745e38f8788f177754a9c98a8624a83a884c11c9a9623937d5358d839bf7421fb934914f784798d943b49b1caf740695a3425e4f21141b3b68a8697f34256ba9a4a96d5d7a04e0badd32aade03592c05bb215f984d65ca6dfaf7e7ddf76268cc243f733452ba0fd5008a9bade774f96f0af4f0821f207a636ae2cf127a574169a0f7f0f584614d4c0a36df624a24d2e77c9a797831aa33a09b3402eb3a9ed3fb76b03e173f2522f7af8a786238de30cabc68f0f9bf45a6c47bc76cc707d4c020bf61d67e130f16ca998a3edaef1be2f997c532fac0f9cf8b680f5c5a3798394e93764aaeaddf0cfe61422a57d5cf7c972532e11a908a759cf23d5ecc745b43c0925e9377cf72210058349ebd4e5c8cc073a0a0d607c3e9ba3d", 0x1000, 0x2}], 0x100000, &(0x7f0000001500)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=0xee01, @ANYRESDEC=r7, @ANYRESHEX=0x0, @ANYBLOB=',hide,euid<', @ANYRESDEC=0xee00, @ANYBLOB=',subj_type=#.,dont_hash,dont_measure,\x00']) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1403.386406] loop0: detected capacity change from 0 to 41948160 12:46:15 executing program 5: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001f00), 0xcc200, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) statx(0xffffffffffffffff, &(0x7f0000001f80)='mnt/encrypted_dir\x00', 0x100, 0x4, &(0x7f0000001fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000020c0), &(0x7f0000002100)=0x0, &(0x7f0000002140)) fsetxattr$system_posix_acl(r0, &(0x7f0000001f40)='system.posix_acl_default\x00', &(0x7f0000002240)=ANY=[@ANYBLOB="0200000001fafbdafd946cd2d80c3c18", @ANYRES32=r1, @ANYBLOB="02000200", @ANYRES32=0xee00, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0xee01, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040002000000000008000600066589c612fcffd2b944faa276d524b3a5ea137707000000790d4c3470aea63aa3", @ANYRES32=r2, @ANYBLOB="08000300", @ANYRES32=r3, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee00, @ANYBLOB="10000100000000002000010000000000"], 0x64, 0x1) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffc, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x1ff}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r4 = socket$nl_route(0x10, 0x3, 0x0) write$binfmt_elf64(r4, &(0x7f0000000840)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x81, 0x7, 0x0, 0xfe6c, 0x2, 0x3, 0x7f, 0x160, 0x40, 0xe2, 0x6, 0x5, 0x38, 0x1, 0x100, 0x2, 0x1000}, [{0x4, 0x3, 0x4, 0x3f, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, {0x6474e551, 0x2, 0x8, 0xf78a, 0x7, 0x80000000, 0x8001}], "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", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x16b0) chdir(&(0x7f0000000040)='./file0\x00') stat(&(0x7f0000002180)='./mnt\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) r6 = getgid() fchown(0xffffffffffffffff, r5, r6) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000200), &(0x7f0000000240)='./mnt\x00', 0x40, 0x6, &(0x7f0000000780)=[{&(0x7f0000000300)="7a0c379d4ae389b3fc563bde48222c80438dc964c1e5b99fd9e8ec1d36c4169ff87ba04f2ef027745a0e9824c25781cb88fd7cff0ce7d195c4bb000e014fd941e8c6f157e08fc93467ea7606505d1a624e5b7cc48d8b32b27f66aea3b25a7a169788441168992a99f7608a0acc7f3f3ed5fab5ebf9fa50a1e0e3a867af25226d", 0x80, 0x9}, {&(0x7f0000000380)="5bc1e265c0dfac817db43086d477b6b45a8e959d1d94339d4572d642f14a3f2d307d1bc2e2963aa8faca66edbaa3eaa564583c35a4bd505d2ce305b2d10132e5ed7b01e8f7c34a72b3b2f3bd6f5c49d38f995ea63240d07557077ec2b9d8ff5e4207cfa01e822982110911b2a203f9799c99373c883a0fd8501755a0e0f134afe56a38bda9a0ccab", 0x88, 0x6}, {&(0x7f0000000440)="9e03b5d02631e2a119c934319b2e0a556397998ab569ff2dcd96658232e344815b588a56195be30af8fb070b51efe7b23f76b49d400ff3e2cf9f3e6b4b251a9debefd44bf285d4cd722cc502cf6955a63df1010b54738577cdfe604973f337eea5f9fc99288036412369afd8fdc13f6d", 0x70, 0x2}, {&(0x7f0000000500)="74f37395a1c6e862a2c64498173783ff3785087510a0b17c9bb6731b0ab459f7c9301eaf6a26f62604a56537dd2a23cf59ae0726abe1413424fedf8fd604377fe1f38e13834cc50124dbd8c34f0b45b6a3637a15d76c387f51c50c25e9f11aa5a0c9dfc34edb379190477ea0ff9b2ea3107054ccad1604543a640c84bcedcc3ab256b42810d7c0a2535b371dddfc0fc6e5c87711", 0x94, 0x8}, {&(0x7f00000005c0)="f43570edfaef6c9538e1b45f86d0e7713d3b4176afaf41600f7b26acbd57d2e082854c1d53c9e25fac5e29ce2bc57d69c7455bf7142a6349ab76089609a351e845102a3ba7014eb5ba8e66914f0e4616daed298a389c17c67a0098a2e45e63ff0895beebd8b80dab662cd709a81002af04900d3dfc6eb5db3a86f9a6782bd72d2e0f1d87e01999d363f2d42d3dae4d35dac9ae67b472e0c7a7f47c8f90519d9dc6c2e8f6a20e978401dc97da3b85c6dec3373db45da14ef0879050ec6c8a7f9cba280febf1372117aa9cace3ef34ab53a1c206854d42e63cb5053f2576bfc0c59a62e2", 0xe3, 0x6}, {&(0x7f00000006c0)="68baeef99ebd48ba61ab1d98de3ab9dbe2d8f38841d63905d5c05a38987a6bcf88aea0d2eb55429b67b0be70467314fb9a8c5fe513ee40de59c39f31c04b72c11d2aa637f36b17be0d872c2b19f9b44d3e1a03daaae8a285effcc4c0803c58909dc406a7a707b86c420cdcc0cb82e655bd71e6b2a6dfa18f5628b806337c49ace3dd2440b7ee5521f1a1f5d0b314b7b81bbebbe886b74c44a00020cc0df44685ac1344631aab792194f25552465ed6335b2ad37aa04e402e3d", 0xb9, 0x2}], 0x106008, &(0x7f0000000280)={[{'vfat\x00'}, {}, {':'}, {'vfat\x00'}, {'vfat\x00'}], [{@audit}, {@appraise}, {@obj_type={'obj_type', 0x3d, 'vfat\x00'}}]}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x80000400) 12:46:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 14) 12:46:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 12) 12:46:15 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') chdir(&(0x7f0000000000)='mnt/encrypted_dir\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:46:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:46:15 executing program 6: getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000001940), &(0x7f0000001980)=0x4) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r0) openat(r0, &(0x7f0000001900)='./mnt\x00', 0x185c02, 0x8) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101442, 0xe0) close(r1) mkdirat(r1, &(0x7f0000000480)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000200)='ext2\x00', &(0x7f0000000240)='./mnt\x00', 0x8, 0x8, &(0x7f0000001740)=[{&(0x7f0000000300)="c8aaf6a6938c299108b6c3d6b4cb039f9b7a8e8aa203fbcdbe2124d119d7b33dd60643d8ea9c73e9f5e2de7ef7c7f5bb987725030e5b039e8f8f3ce49d40275dd3beb94bfe898a9262d02e28f8caf4f17f55b6c1c5c965c4e0e4575955600dfd28d8fe4175685f63aed5ed8d7c0bf913aa2eb82635be14934c594c", 0x7b, 0x8}, {&(0x7f0000000280)="b24b8c066aec5cccc005836e9ed71de721340964323055ae1e69cfeea348334071add946", 0x24, 0x6}, {&(0x7f0000000500)="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", 0x1000, 0x9}, {&(0x7f0000000380)="927de89a879abd816f1eae883ea9bbad1b12a8ef6dfb01be66b8b96daddb0f694cdfe9e31b85ec7b064488217b71cdbe18c1ff372228f832287cc1923f9847dcf1dc714dd1cf150156eaebdde7efee171a3f715268fef93bb4a4554a6ab054107c30a373c264467c25669cf0e8619a57197d71c6b38a6df59327ef7da23b04bde56fac00f19588", 0x87, 0xff}, {&(0x7f0000000440)="c14da563d68a", 0x6, 0x7fff}, {&(0x7f0000001500)="1db9c12a0942a5f7d3b734155eabc7b389677300b6167b0cd580a70c17316f0edd8e8cf386d5a77bd440be936f7535733f01dda82493337f4a398cb1f1c0c28c3d8f80e6a6e8f73106c7a0e578298e82fc2b30539d27a06f432f3475b70de37673d047d578670bc8cd2f3be8c8555ed48805d410117c9628a8f7357b41b0e1290f62e56a09aaad3e013e95ae22bb75c20edefec7683afdee", 0x98, 0x8}, {&(0x7f00000015c0)="90270b1a3d50767c8d403b95c96db848897470b0b262d00b054584383202b93c9a79d65bbe91d1d8aa88d8fc92709fd9d5d32654ae59406a48ead50fb7f37ff8540b3f2c2d238f2723663327bb32e33941fe3c6d22e4", 0x56, 0x6}, {&(0x7f0000001640)="51c497c5c212bd8b07631f4bcc465b277a048450fec97a33cba32df16404a3dbee75c5b801e02525678f1e230b1067d839d75661b265e50ed6c89514bb4add6eb939d32674ee37be98258aa5f68e1ec966ae04e35ca890a0ef55148f137e8b1f9d02fbb6f7de0cdc19c59f9a3297bf350e30080dcea373924d0dc15f6fb41fae06c2e04e85345f11e23dd8f460cf36e142db8ded6563187c666e95cec3f6d64a58f1f3801220fe2a7ba4b49f2f462fab997011454bce0e9430f94539036002dbb47c3ad01cf1594a39fd8e8c746433c170", 0xd1, 0x2}], 0x2000, &(0x7f0000001800)={[{@nojournal_checksum}, {@noload}, {@discard}, {@nodiscard}, {@mblk_io_submit}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@block_validity}, {@barrier_val={'barrier', 0x3d, 0x1}}, {@nouser_xattr}], [{@fowner_eq}, {@fowner_gt={'fowner>', 0xee00}}, {@smackfsdef}, {@subj_role}]}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') creat(&(0x7f0000000000)='mnt/encrypted_dir\x00', 0x58) [ 1403.416921] loop2: detected capacity change from 0 to 41948160 [ 1403.429349] FAULT_INJECTION: forcing a failure. [ 1403.429349] name failslab, interval 1, probability 0, space 0, times 0 [ 1403.430967] CPU: 1 PID: 8668 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1403.431872] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1403.432955] Call Trace: [ 1403.433296] dump_stack+0x107/0x167 [ 1403.433778] should_fail.cold+0x5/0xa [ 1403.434267] ? create_object.isra.0+0x3a/0xa20 [ 1403.434882] should_failslab+0x5/0x20 [ 1403.435364] kmem_cache_alloc+0x5b/0x310 [ 1403.435924] ? fat_parse_short+0x914/0xd30 [ 1403.436465] create_object.isra.0+0x3a/0xa20 [ 1403.437023] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1403.437717] kmem_cache_alloc+0x159/0x310 [ 1403.438247] fat_parse_long.constprop.0+0x8e9/0xb50 [ 1403.438924] ? vfat_rename+0x1bb/0xf60 [ 1403.439430] fat_search_long+0x380/0xd90 [ 1403.439989] ? fat_parse_short+0xd30/0xd30 [ 1403.440524] ? vfat_rename+0x1bb/0xf60 [ 1403.441094] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1403.441783] vfat_rename+0x3a0/0xf60 [ 1403.442270] ? vfat_mkdir+0x440/0x440 [ 1403.442788] ? lock_release+0x680/0x680 [ 1403.443295] ? lock_acquire+0x197/0x470 [ 1403.443844] ? lockref_get+0x11/0x50 [ 1403.444325] ? find_held_lock+0x2c/0x110 [ 1403.444857] ? down_write_nested+0xe4/0x160 [ 1403.445408] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1403.446108] vfs_rename+0xd6c/0x1510 [ 1403.446589] ? vfs_unlink+0x8b0/0x8b0 [ 1403.447089] ? _raw_spin_unlock+0x1a/0x30 [ 1403.447631] do_renameat2+0xae1/0xbf0 [ 1403.448124] ? __ia32_sys_link+0x80/0x80 [ 1403.448649] ? __virt_addr_valid+0x170/0x5d0 [ 1403.449256] ? __check_object_size+0x319/0x440 [ 1403.449884] __x64_sys_rename+0x7d/0xa0 [ 1403.450395] do_syscall_64+0x33/0x40 [ 1403.450901] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1403.451552] RIP: 0033:0x7f4eb49c4b19 [ 1403.452034] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1403.454420] RSP: 002b:00007f4eb1f3a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1403.455441] RAX: ffffffffffffffda RBX: 00007f4eb4ad7f60 RCX: 00007f4eb49c4b19 [ 1403.456377] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1403.457330] RBP: 00007f4eb1f3a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1403.458263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1403.459199] R13: 00007ffdf23d638f R14: 00007f4eb1f3a300 R15: 0000000000022000 [ 1403.461581] loop3: detected capacity change from 0 to 41948160 [ 1403.480226] loop7: detected capacity change from 0 to 41948160 [ 1403.485389] FAULT_INJECTION: forcing a failure. [ 1403.485389] name failslab, interval 1, probability 0, space 0, times 0 [ 1403.487049] CPU: 0 PID: 8687 Comm: syz-executor.2 Not tainted 5.10.238 #1 [ 1403.488010] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1403.489178] Call Trace: [ 1403.489542] dump_stack+0x107/0x167 [ 1403.490112] should_fail.cold+0x5/0xa [ 1403.490645] ? create_object.isra.0+0x3a/0xa20 [ 1403.491336] should_failslab+0x5/0x20 [ 1403.491869] kmem_cache_alloc+0x5b/0x310 [ 1403.492441] ? __lock_acquire+0x1657/0x5b00 [ 1403.493079] create_object.isra.0+0x3a/0xa20 [ 1403.493705] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1403.494433] kmem_cache_alloc_trace+0x151/0x320 [ 1403.495128] vfat_add_entry+0x23a/0x2720 [ 1403.495711] ? find_held_lock+0x2c/0x110 [ 1403.496338] ? current_time+0x72/0x2c0 [ 1403.496893] ? vfat_rmdir+0x460/0x460 [ 1403.497436] ? mark_held_locks+0x9e/0xe0 [ 1403.498071] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1403.498822] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1403.499576] ? trace_hardirqs_on+0x5b/0x180 [ 1403.500190] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1403.500938] ? ktime_get_coarse_real_ts64+0xfd/0x190 [ 1403.501664] ? current_time+0x1e6/0x2c0 [ 1403.502276] ? igrab+0xc0/0xc0 [ 1403.502771] vfat_rename+0xbd9/0xf60 [ 1403.503320] ? vfat_mkdir+0x440/0x440 [ 1403.503883] ? lock_release+0x680/0x680 [ 1403.504472] ? lockref_get+0x11/0x50 [ 1403.505017] ? down_write_nested+0xe4/0x160 [ 1403.505636] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1403.506393] vfs_rename+0xd6c/0x1510 [ 1403.506957] ? vfs_unlink+0x8b0/0x8b0 [ 1403.507502] ? _raw_spin_unlock+0x1a/0x30 [ 1403.508131] do_renameat2+0xae1/0xbf0 [ 1403.508675] ? __ia32_sys_link+0x80/0x80 [ 1403.509302] ? __virt_addr_valid+0x170/0x5d0 [ 1403.509940] ? __check_object_size+0x319/0x440 [ 1403.510612] __x64_sys_rename+0x7d/0xa0 [ 1403.511204] do_syscall_64+0x33/0x40 [ 1403.511729] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1403.512494] RIP: 0033:0x7f5abea14b19 [ 1403.513021] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1403.515609] RSP: 002b:00007f5abbf69188 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1403.516674] RAX: ffffffffffffffda RBX: 00007f5abeb28020 RCX: 00007f5abea14b19 [ 1403.517733] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1403.518728] RBP: 00007f5abbf691d0 R08: 0000000000000000 R09: 0000000000000000 [ 1403.519748] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1403.520770] R13: 00007ffe1e8b4a0f R14: 00007f5abbf69300 R15: 0000000000022000 [ 1403.525449] loop4: detected capacity change from 0 to 41948160 12:46:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 13) [ 1403.565957] loop1: detected capacity change from 0 to 27136 12:46:15 executing program 6: chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000240)=@filename='mnt/encrypted_dir\x00', &(0x7f0000000280)='mnt/encrypted_dir\x00', &(0x7f0000000300)='ecryptfs\x00', 0x20420, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x1000, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000080)='&,@%,/\x98\x00', &(0x7f00000000c0)='mnt/encrypted_dir\x00', r0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6}}, &(0x7f0000000480)=0xe8) recvmmsg$unix(r0, &(0x7f0000001200)=[{{&(0x7f0000000600), 0x6e, &(0x7f0000000ac0)=[{&(0x7f0000000680)=""/62, 0x3e}, {&(0x7f00000006c0)=""/18, 0x12}, {&(0x7f0000000700)=""/21, 0x15}, {&(0x7f0000000740)=""/13, 0xd}, {&(0x7f0000000780)=""/125, 0x7d}, {&(0x7f0000000800)=""/39, 0x27}, {&(0x7f0000000840)=""/151, 0x97}, {&(0x7f0000000900)=""/178, 0xb2}, {&(0x7f00000009c0)=""/247, 0xf7}], 0x9, &(0x7f0000000b80)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x68}}, {{0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000c00)=""/255, 0xff}, {&(0x7f0000000d00)=""/153, 0x99}, {&(0x7f0000000dc0)=""/53, 0x35}, {&(0x7f0000000e00)=""/193, 0xc1}, {&(0x7f0000000f00)=""/22, 0x16}, {&(0x7f0000000f40)=""/76, 0x4c}, {&(0x7f0000000fc0)}, {&(0x7f0000001000)=""/19, 0x13}, {&(0x7f0000001040)=""/189, 0xbd}], 0x9, &(0x7f00000011c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0x20}}], 0x2, 0x40010040, &(0x7f0000001280)={0x77359400}) stat(&(0x7f0000001300)='./file1\x00', &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000013c0), &(0x7f0000001400)=0x0, &(0x7f0000001440)) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2, &(0x7f0000000840)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltgid}, {@posixacl}, {@access_any}, {@version_u}, {@dfltgid={'dfltgid', 0x3d, r6}}, {@version_9p2000}], [{@fowner_eq}, {@dont_hash}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@measure}, {@smackfshat={'smackfshat', 0x3d, '\',\'A'}}, {@seclabel}, {@pcr={'pcr', 0x3d, 0x33}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@appraise}]}}) setxattr$system_posix_acl(&(0x7f0000000100)='mnt/encrypted_dir\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000001480)={{}, {}, [{0x2, 0x4, 0xee01}, {0x2, 0x2, 0xee00}, {0x2, 0x4, r1}, {0x2, 0x3, r2}, {0x2, 0x4, r3}], {0x4, 0x3}, [{0x8, 0xd, 0xee01}, {0x8, 0x0, r4}, {0x8, 0x1}, {0x8, 0x2, r5}, {0x8, 0xa, r6}], {0x10, 0x2}}, 0x74, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') newfstatat(0xffffffffffffff9c, &(0x7f0000000340)='mnt/encrypted_dir/file0\x00', &(0x7f0000000380), 0x1000) open(&(0x7f0000000000)='./file1\x00', 0x20080, 0x8) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200), 0x20180, 0x0) 12:46:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') (fail_nth: 15) 12:46:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee01}}, './mnt/file0\x00'}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:46:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000200)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000240)='./file1\x00', &(0x7f0000000280)='proc\x00', 0x10400, &(0x7f0000000300)='vfat\x00') openat(r0, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0xa800, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:46:16 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x82200, 0x28) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1403.793957] loop5: detected capacity change from 0 to 41948160 [ 1403.814688] loop3: detected capacity change from 0 to 41948160 [ 1403.875974] loop7: detected capacity change from 0 to 41948160 12:46:30 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:46:30 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b46732e66617c00020801000470008400565b", 0x17, 0x10000}, {0x0, 0x0, 0x4}], 0x80, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./mnt\x00', 0x4, 0x4, &(0x7f0000000400)=[{&(0x7f0000000300)="0563b7a544b3e907315f5f4d009a8b318bbd8c0e6efd12a9f94c73ff8195206d43b9b59c1057796bf9a6a9630de25b80f606064b19f91dfe4097dd9c67d098c909332d8a37b2668a735643ae632a4aaaf78e5685caf23214b6d2401fd5b65da7821f30195f44b84647a2ef486bca849a20483f70c91909f808de76f5bd3924db9b9f2f19568527d72201a8f3e09fdc93141dc192c0517e71de820cf1360d01b98f463a7abae81298ca7e6a0861630f264b6441950204072f022e09749f404a94d6fc9ae9dcd83b6af28697ce4a5782f5e242edcf231fe19fc210ac98333dac1dad99c10ed5", 0xe5, 0x7}, {&(0x7f0000000500)="b10b251dfdf2cbdbfc8e88fc73d82d17ea728b6ac2389174920206e923350edd0ac76fb79ec0c7cfeb8852c6c229fa2f00cfa38ea71b467f4b799465ca626f577f18b28f772391c03f2bd01d0f2a65a01bd0a7d920fec26fcff41205a9c2046ce17c63dbdea35e7c57f8e0620eea9d893bb46f9b11b7622d6e69edc37d5309e6cb5a00fe57902148a0d7adbc2a490a763eb05fea2fb64a413ace9cfb75df4482805e4d696dad3ab5d76c7c1f329441d6cc6a589aaa178634165a1fc0e1f9aa2b30ad", 0xc2, 0x8}, {&(0x7f0000000600)="6953cc6ad081acd02a49eb9fbdfc6a44be1c1ca76d7849228ba0404bbbfbb3846ee6e54db2ba3d38891d155d0b913f837455e7f22354546d13b922a345ce4f31c152c82a67ca9fd1004912bc13b1294c6d112d755e89758fe819217f58bbf439c305f450695286678c713dc57bb9863289e4ca60c6b9542418abc0a18bd6fc7272247467550af2733aed0e71630b7c17ae778abfef29bee6afe7de96177cadb2d5a3fab874994bbaf261693f9649a22f410011c16e389d23c7e5fb599ec5d02a8012e70ff0538b7cebc843b70c2c329f1942a762d4ad1758", 0xd8, 0x12d}, {&(0x7f0000000700)="dc93527bac521928569d9b3872673ef6f0757643a40016154f29009c5126496ed593221980e18e555425e1a2e72590af9b6f5918ec7754c56a34df2dc5834db625fb1e62368247663be07ad55138ab4608e6f5a69add151c31331e9d529001e63469ff158b626fcc4868debf8937435a1d46956f2c02e0269476fda9b42d539c135c7fd229b5da7cf01d194297cd742df77ae7379ddde9815480b24bdca61429a7db0c5eed91d036585a629aab3a03a6fc7a8517bbfe9958ea013d3e080aa0abea63ec0713317119aa16288b0f", 0xcd, 0x4}], 0x4, &(0x7f0000000800)={[{@fat=@nfs_nostale_ro}, {@fat=@quiet}, {@dots}, {@fat=@fmask={'fmask', 0x3d, 0x1000}}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@fat=@codepage={'codepage', 0x3d, '869'}}, {@fat=@usefree}], [{@permit_directio}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') openat(r0, &(0x7f0000000000)='./mnt\x00', 0x80, 0x24) 12:46:30 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = dup2(r0, r0) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000340)=@IORING_OP_POLL_REMOVE={0x7, 0x0, 0x0, 0x0, 0x0, 0x889c7cb2ceb4d95c, 0x0, 0x0, 0x1, {0x0, r2}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x5, 0x2004, @fd=r1, 0xffffffffffff7fff, &(0x7f0000000000)=""/48, 0x30, 0x6, 0x1, {0x0, r2}}, 0x4) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r3 = getuid() lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2, &(0x7f0000000840)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltgid}, {@posixacl}, {@access_any}, {@version_u}, {@dfltgid={'dfltgid', 0x3d, r4}}, {@version_9p2000}], [{@fowner_eq}, {@dont_hash}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@measure}, {@smackfshat={'smackfshat', 0x3d, '\',\'A'}}, {@seclabel}, {@pcr={'pcr', 0x3d, 0x33}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@appraise}]}}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000500)={{0x1, 0x1, 0x18, r0, {r3, r4}}, './file0\x00'}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r5) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r6) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r5, 0xc018937a, &(0x7f0000000480)={{0x1, 0x1, 0x18, r6, {0x1}}, 'mnt/encrypted_dir\x00'}) sendmsg$nl_generic(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000380)={0xc8, 0x17, 0x100, 0x70bd2a, 0x25dfdbfb, {0x18}, [@generic="1388edeedf2e35787f6406ee214aaa82950583f9a986be31d354ac63602073571d7310796b3a1fefac5d60bd62f4e7cc735c0a9caaf52f0c179d3e7047999e0aa58ee2961dd0087a8a24e2eff44ab0a09d8bb645e998c3e39779fd0211e723d2fed593d36ed04298b019ed826a514717491010a078696bd8b5927a8248f9d755c10b00d5c9d9d25b80e281b245dab691b1979427b7b3193b1cb0f45ac4788e62fa941950f2c5abab1f6fc7c030abdfa75fd322"]}, 0xc8}, 0x1, 0x0, 0x0, 0x40000}, 0x2001) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:46:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:46:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000200)='./mnt\x00', 0x1, 0x2, &(0x7f0000000340)=[{&(0x7f0000000240)="f8dc8a9e61a5ce2e43a11ea445ae69598088242c71a70c73641eba2fc337a665472300dcd5aa9644c2fcf4673f89985e20b0f73554d2f2881fbfba3ebc8f39f83ab0a21fa0f04d39440cb74748b351fbcec336d55a417b5ca0a616b7a8e40dd20d9ed1bd1b842ac373a29c318a4e7faf6b7f87bbd04e", 0x76, 0x7ffffffffffffffc}, {&(0x7f0000000300)="fa936d6334f1a227360ffa8ec29b5bf8fe7af5074251e1a0967b7b3ed9b341a5373fadde3f1f14", 0x27, 0x200299}], 0x2000002, &(0x7f0000000400)={[{@huge_within_size}, {@size}, {@huge_within_size}, {@huge_advise}], [{@euid_eq={'euid', 0x3d, 0xee00}}]}) 12:46:30 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', 'vfat\x00'}, &(0x7f0000000500)=""/4096, 0x1000) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x800, 0x102) 12:46:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./mnt\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:46:30 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000140)='./file1\x00', 0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x16}, {0x0, 0x0, 0x1001000a00}], 0x20, &(0x7f0000000240)=ANY=[]) getdents(r0, &(0x7f0000000280)=""/14, 0xe) chdir(&(0x7f0000000040)='./file0\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r1, 0x0, 0x30, &(0x7f0000000180)={0x0, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @local}}}, 0x108) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(r2, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x200000, 0x2) utimensat(r2, &(0x7f00000002c0)='./mnt\x00', &(0x7f0000000300)={{}, {0x0, 0xea60}}, 0x100) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) mount$9p_fd(0x0, &(0x7f0000000240)='mnt/encrypted_dir\x00', 0x0, 0x10004, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1417.978688] loop3: detected capacity change from 0 to 41948160 [ 1418.002559] loop0: detected capacity change from 0 to 41948160 [ 1418.017625] loop7: detected capacity change from 0 to 131072 [ 1418.028587] loop4: detected capacity change from 0 to 41948160 12:46:30 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0/file0\x00', 0x180) fstat(r1, &(0x7f0000000300)) mount$9p_rdma(&(0x7f0000000000), &(0x7f0000000280)='./file0\x00', &(0x7f0000000240), 0x10040, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=rdma,port=0x0000000000004e23,rq=lm00000000000000b7,rq=0x000000000000007f,sq=0x0000000000000006,rq=0xffffffffffff7fff,\x00']) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x7}}, 'mnt/encrypted_dir\x00'}) openat(r2, &(0x7f0000000380)='mnt/encrypted_dir\x00', 0x20901, 0x175) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) openat(r1, &(0x7f0000000400)='./mnt\x00', 0x100, 0xbf) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1418.036382] loop1: detected capacity change from 0 to 41948160 [ 1418.042993] loop5: detected capacity change from 0 to 41948160 [ 1418.057767] FAT-fs (loop7): bogus number of reserved sectors [ 1418.058571] FAT-fs (loop7): Can't find a valid FAT filesystem [ 1418.073795] loop2: detected capacity change from 0 to 41948160 12:46:30 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400000, 0x21) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1418.085238] loop3: detected capacity change from 0 to 41948160 12:46:30 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x601) [ 1418.120372] loop7: detected capacity change from 0 to 512 12:46:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000000)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1418.173424] FAT-fs (loop7): Unrecognized mount option "permit_directio" or missing value 12:46:30 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat2(0xffffffffffffff9c, &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000300)={0x0, 0x16, 0x1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = dup2(r0, r0) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x12) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f00000001c0)='mnt/encrypted_dir\x00', &(0x7f0000000240)='./mnt\x00') openat(r0, &(0x7f0000000200)='./file0\x00', 0x80001, 0x105) 12:46:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x0, 0x401, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:46:30 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x98040, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') symlink(&(0x7f0000000200)='./mnt\x00', &(0x7f0000000240)='./file2\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r0) mkdirat(r0, &(0x7f0000000000)='./mnt\x00', 0x191) 12:46:30 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xa0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400200, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r0 = syz_open_dev$vcsn(&(0x7f0000000200), 0x5, 0x60001) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x38, 0x0, 0x1, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5d4}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xc4ec}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xffff7ffe}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4010}, 0x40) 12:46:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x3f}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000200)={{0xa, 0x4e23, 0x3, @mcast1, 0x8001}, {0xa, 0x4e21, 0x100, @local, 0x4000c2}, 0xe5, [0x8, 0x3, 0x5, 0x9, 0x2, 0x13, 0x8, 0x1f]}, 0x5c) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r0) write$P9_RREADLINK(r0, &(0x7f0000000780)={0x1a, 0x17, 0x1, {0x11, 'mnt/encrypted_dir'}}, 0x1a) syz_io_uring_complete(0x0) stat(&(0x7f0000000300)='mnt/encrypted_dir\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000006c0)='./file1/file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = accept4(r0, &(0x7f00000007c0), &(0x7f0000000840)=0x80, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000880)={{0x1, 0x1, 0x18, r7, {r5, r4}}, 'mnt/encrypted_dir\x00'}) setxattr$system_posix_acl(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x4, 0xffffffffffffffff}, {0x2, 0x4, 0xffffffffffffffff}, {0x2, 0x1}, {0x2, 0x0, r1}], {0x4, 0x2}, [{0x8, 0xd, r2}, {0x8, 0x3, r3}, {0x8, 0x0, r4}, {0x8, 0x1, r6}, {0x8, 0x1, 0xffffffffffffffff}], {0x10, 0x1}, {0x20, 0x2}}, 0x6c, 0x2) mkdir(&(0x7f00000008c0)='./file1\x00', 0x9d) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1418.277335] loop5: detected capacity change from 0 to 41948160 [ 1418.289485] loop2: detected capacity change from 0 to 41948160 [ 1418.315208] loop1: detected capacity change from 0 to 41948160 [ 1418.349624] FAT-fs (loop4): bogus number of reserved sectors [ 1418.350776] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1418.447367] FAT-fs (loop4): Unrecognized mount option "" or missing value 12:46:45 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./mnt\x00', 0x42, 0xe0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000380)='mnt/encrypted_dir\x00', 0xffffffff, 0x1, &(0x7f0000000480)=[{&(0x7f00000003c0)="972d4b7dac257855d56dacf5d8c83e3a11b63f709798092709d38bc60e894da578254571cf7b35421271dfb1d0f3133cba8321495d7808cca0573a1d573f448f93ed34832bc053719bf287638a4a52a0656781ec9c69669b62fd2f15ebe35ca7e9822779e2f48cff4ff5dd3ebd45ad982e664de0751a17e6cdf7d995a79c152f5f27bff526875ffc728ef9c8e13752b83afac797af95a25adfcd806c", 0x9c, 0x7}], 0x800000, &(0x7f0000000500)={[{@size={'size', 0x3d, [0x30]}}, {@size={'size', 0x3d, [0x74, 0x6d]}}, {@huge_always}], [{@euid_eq={'euid', 0x3d, r2}}, {@appraise_type}, {@obj_role={'obj_role', 0x3d, '*'}}, {@measure}]}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000580)={{0x1, 0x1, 0x18, r0, {0x4}}, './file1\x00'}) close(r1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r4) sendmsg$nl_generic(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="1c020000df251100000000000000000000000000000000007116161e07e4b24937d6035284bf7d60707884d9c65e44a49449419d8abfd53e4f9732df725ac153a2e495d518707909149d03a4981c08812469afa44730b70358eeab47b2327d719eef119fc19fef8e64cc42e84d7378205146f5ecb03b2270e69e690766498d5a43a35ec7414e5118ad2644388556e0b60da6141f0805307c88ad5a88f9b1c7d23b09b6101d9163f59a743c423e8b4b9ad3c6c5c7d9cfc3d37151f8bf7882efc3ffc579a7deeabb12a9516209d5ca87e973d3ba9513eecba9db8db9064cc57dbd6358d17198d60a33", @ANYRES32, @ANYBLOB="5e013f803da9cce474d879aa2548ab05fde2ab74a3f68afd9d0fdbdd188437ad1e3ee2496f41fb5695f16f5aa3a9b9830c4d19efb323d32378896cb4e333b536f56e7722416c8312509aec969a260eb62ed42970aaf9b60ca7c270fc8f91f1ef6ff1796a8e914cca4d65cc6912efa9770e84263c96b34e5da2116abe686272f8d437ebfb9828acb4af326eb91d9e263a660a9bfbcbdec84253e4792090bd03505fbc9370039b3bb2b57140d4e1128457c36137de97f89080605bd9a1a53141988ffe0e679308a9b72d781fe9fcc534a960420e08aff99522cbc8923f6315ee453292e1e442faf975edac0d76b7acd9636908002600", @ANYRES32, @ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="0000807c39fec09aa404f19593974a310106b4b1a442654ef315816cab30b9fd97315508f93b999147b095073f1a3c308528575fc1b55fbc2f6af5e2dfe7b1cb2c56a8f3a7462cc57d7e37ab7dd859495e5e8a8b8aebd565f9dd07f0ad82d4bf8c7f592ada25befa29e0273c4ec5a8b3d4ec3f847d6407715403afe22fef5a032e0c2f50114e7fa258806f5b887e3464fa836e05c45f1da237dce80a6fe39da98ddc3cb005b80c51f10cfbbfc9ad6567d3e804359de58c26e8a41b"], 0x21c}, 0x1, 0x0, 0x0, 0x40004}, 0x800) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='./mnt\x00') 12:46:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./mnt\x00', 0x101000, 0x4) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:46:45 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x400000000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f82f", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:46:45 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000200), 0x6e, &(0x7f0000001600)=[{&(0x7f0000000280)=""/13, 0xd}, {&(0x7f0000000300)=""/131, 0x83}, {&(0x7f00000003c0)=""/115, 0x73}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/255, 0xff}, {&(0x7f0000000440)=""/93, 0x5d}], 0x6, &(0x7f0000001680)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0x20}, 0x40000020) fchownat(r0, &(0x7f0000000000)='./mnt\x00', r1, 0xee01, 0x1000) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:46:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000000)='./mnt\x00') chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:46:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x6f87, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x3}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) syz_io_uring_submit(0x0, r3, &(0x7f0000000200)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x3, 0x0, 0xffffffffffffffff, 0x0, r0}, 0x401) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './mnt\x00'}) getsockname(r5, &(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @random}}, &(0x7f0000000300)=0x80) 12:46:45 executing program 3: syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)={0xd0, r0, 0x1, 0x70bd2b, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}]}, 0xd0}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) read(r1, &(0x7f0000000080)=""/65, 0x41) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380), r1) sendmsg$DEVLINK_CMD_RATE_DEL(r1, &(0x7f0000000540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r2, 0xb1575afecd8b75a9, 0x70bd2b, 0x25dfdbff, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000080) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10000100}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, r2, 0x10, 0x70bd29, 0x25dfdbfe, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc800}, 0x40008d0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1432.904757] loop7: detected capacity change from 0 to 41948160 12:46:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x4, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000240)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000000, 0x20010, r1, 0x0) r3 = syz_io_uring_setup(0x6f87, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x3}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r3, 0x8000000) syz_io_uring_submit(r6, r5, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) syz_io_uring_submit(r2, r5, &(0x7f0000000000)=@IORING_OP_SEND={0x1a, 0x3, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300)="cb4add6dc94c278fecdb519c9ebf80f094408dc9724f0b562eb4209a254951298a1dcb873e3931f217d9ffe3277c75f6ad00524d026b1348e40e8dfa295e22fffaace526b03fc70d3ca153c96327adbda6b2b29c9e13c170e03f9f8c0308ac2b7a72e948d62250e0223ca1e843e1d817bd6c696631d501265bf7d0d479d3eb6822b324ff5bb2dfa0b7ec3f358cb80efc289d768a1c981082f2ee21b2bfda3811b3c3ebdbccede7b778f915d17b95a3cd2dbc4d509c7044e45ca4dd342d74ecb6cc056523e922b8f7d08d12aefb39fa4676ddde1af881b93bc47e11cff50ae5a0e9eda6d2eb79", 0xe6, 0x4048810, 0x1}, 0x7f) [ 1432.909532] loop2: detected capacity change from 0 to 41948160 [ 1432.918675] loop1: detected capacity change from 0 to 41948160 [ 1432.927477] loop5: detected capacity change from 0 to 41948160 [ 1432.936192] loop4: detected capacity change from 0 to 41948160 [ 1432.968055] loop0: detected capacity change from 0 to 41948160 12:46:45 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x200e082, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1433.015932] loop3: detected capacity change from 0 to 41948160 12:46:45 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)=ANY=[@ANYBLOB="00200000ff03005302ceab00", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./mnt\x00']) openat(r1, &(0x7f0000000200)='mnt/encrypted_dir\x00', 0x200000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./mnt\x00', 0x84) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = dup3(0xffffffffffffffff, r1, 0x0) mkdirat(r2, &(0x7f0000000240)='mnt/encrypted_dir\x00', 0x8) [ 1433.036241] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8819 comm=syz-executor.3 12:46:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug', 0x40801, 0x9) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x8) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:46:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') stat(&(0x7f00000007c0)='./file0/file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000700)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) pipe(&(0x7f0000000740)={0xffffffffffffffff}) mkdirat(r1, &(0x7f0000000780)='./file0\x00', 0x102) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000200)='./file0/file0\x00', 0x4, 0x3, &(0x7f0000000240)=[{&(0x7f0000000300)="e454345b42c72488ad258866742bf9d7e1df56b9dad38b94a5ccebd294d5181f11af9b98289436056c9f2decf6b10afbb230f8d1b44070b116c743021dff234f410cd417ecc342d0cfc0172df3f9aadcc416f041d6c386cc8ef3dc4ab4c00eaeb765619bd76b6ab340bec564dac45ff5574007734f4e6a1a5f99a4a3d0a71eacb8631ade62a9b236d6e354e609fb9d47e9b23ff484e7c1829626731dcf", 0x9d, 0x6}, {&(0x7f00000003c0)="e8de17055af6ba3be320bd4f14aa3241c9072325e3d2ad6cc7dc3368fa47fd5e151781ccab8d1be1bddde2d95eb4895b013e757168d3fdd9f932fc1670edd38bc6ca8803a7b8bb5bc2c86eaf48ebfe67262835faf36680161c73193d45eea8433792a9734a5462c85a4602470369ba50bb6c8f3e9f7bbbb88563c76da9f1ee1bb50a7c5539e7d62cd18af0fc5b0950c291eec3352830f15b7afe60abac09d682c76d2c3e6f8225cb649b90ea15e0fe8de6cb8e88347cf04c33b3275681ca342f8eaf5d4968eccc75dd0fb02ace88fe670061317db03f907fa9d467d5ca7cf4ac5d63c6a3ff50b31eb01ddc8f5a", 0xed, 0x1000}, {&(0x7f0000000500)="e3f54d8baa7db44b9ca3b6b89d9b5afc625d6e2295f3b77609538079445ebe1f62a0bdad03676121b482ad7d4e4481de89b9fb426bbb97eb150fdcd71d5c3874c9fdad52edda8b63dd28dbbc16d797924b93b4f64a86814393a72e1f8ef55f58e18d4cfc597ec63a8c9687b0664da10058ed7d81a0ab1c2202dd86b9670141af9d0968", 0x83, 0xa7}], 0x800001, &(0x7f00000005c0)={[{@map_normal}, {@gid={'gid', 0x3d, 0xee01}}, {@check_strict}, {@block={'block', 0x3d, 0x800}}, {@unhide}, {@mode={'mode', 0x3d, 0x3}}, {@nocompress}], [{@smackfsroot={'smackfsroot', 0x3d, '$+'}}, {@obj_type={'obj_type', 0x3d, '^{(!^-'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@subj_role}, {@fowner_lt={'fowner<', r0}}, {@pcr={'pcr', 0x3d, 0x1c}}, {@fowner_eq}, {@subj_type={'subj_type', 0x3d, '+'}}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1433.107015] loop1: detected capacity change from 0 to 41948160 [ 1433.121136] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8854 comm=syz-executor.3 [ 1433.140985] loop5: detected capacity change from 0 to 41948160 12:46:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x11008, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:46:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:46:45 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="01000000000000f62d2f32a60e5830ff"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:46:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) utimes(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000200)={{0x77359400}, {0x77359400}}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1433.272088] loop4: detected capacity change from 0 to 41948160 [ 1433.278527] loop2: detected capacity change from 0 to 41948160 [ 1433.353123] loop0: detected capacity change from 0 to 41948160 12:47:00 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fchmodat(r0, &(0x7f0000000200)='./file0\x00', 0x40) mkdirat(r1, &(0x7f0000000000)='./mnt\x00', 0x2) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1448.043968] loop7: detected capacity change from 0 to 41948160 [ 1448.073080] loop0: detected capacity change from 0 to 41948160 [ 1448.075743] loop1: detected capacity change from 0 to 41948160 12:47:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x193b00, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) mount$9p_fd(0x0, &(0x7f0000000000)='mnt/encrypted_dir\x00', &(0x7f0000000200), 0x40000, &(0x7f0000000500)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@debug={'debug', 0x3d, 0xc6c}}, {@cache_mmap}, {@nodevmap}, {@access_client}, {@access_user}, {@access_client}], [{@uid_eq={'uid', 0x3d, r2}}, {@dont_appraise}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@dont_hash}]}}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:47:00 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x80000000}}, './file0\x00'}) 12:47:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r0) sendmsg$unix(r0, &(0x7f0000000400)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000000300)="5f287877747126d98160de9f886030dffc99d279db0e18c6d2d30186e3dcebb8f5d379266b400d6a4d11eaea4d53b51d59cd1b75a86e974fb2f2bc7530195e80cd9eb24a32f69d50222137ee7c877ff5ca7fe78d061a3216c5544e2b41988c3fe4034388c4f0c3454c1d80edd9aecceb88f9078d7560ffbbf72c816411cc515f014b903e8146d6e30d298e595702e8457f75e5fbb42c7b49034545c568c7fcbf8409267fffff9018b56f40df9014d3407225991be9efae19c76031e977f862115efa95b2dfdd15bb05297b666cba714dea7f6590074a02c206fc09", 0xdb}, {&(0x7f0000000000)="9517b37189546bf9f43d7e4594f9da5ad924179a87f583ec5e433b3d4b3c1087", 0x20}], 0x3, 0x0, 0x0, 0x20000800}, 0x448c0) 12:47:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x7ff, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:47:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f00000005c0)=@md0, &(0x7f0000000600)='./mnt\x00', &(0x7f0000000640)='sysfs\x00', 0x0, &(0x7f0000000680)='session') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x400000, 0x10) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000200)='./file0\x00', 0x7, 0x4, &(0x7f0000000400)=[{&(0x7f0000000240)="df6e749d078b6061ac0bc0e3261024a3c0e349f6358fd09fa98234336b6e3cb7a637c3003d066440ea151d3a52cdcf939bcd94458996247458a53efeea41b050ed2e7cb5e97e4a420db8542787e2027b339e68266d1bcf57035b88f1cb02774237f7cf8dce424ef457943f7633cb37d18b69169fb416", 0x76, 0x7ff}, {&(0x7f0000000300)="00ec18", 0x3, 0x5}, {&(0x7f0000000340)="4e115836dc8cacf6605eafa683f18de5aa61cbbca8940a6a08d6fefd9f3470c9b50b365517e2a3cee701c5c38acf19e5", 0x30, 0x1}, {&(0x7f0000000380)="a14a9570c768bfdadfd42f8e1a2bb216be394504725110ca216a8d76ef99d8cd617d92562acb5d48b35b972ae07a801e8ea98e318dc7e74d182ffd67ec2ef03dd693ee2d245680af0865b3644792828367842b8cb8921cd668b36e103564bb1a08805a7d23c8ea41c5c86331b5", 0x6d, 0x100}], 0x2000000, &(0x7f0000000500)={[{@session={'session', 0x3d, 0x24}}, {@nojoliet}, {@check_strict}, {@hide}, {@nocompress}, {}, {@check_strict}], [{@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@subj_role={'subj_role', 0x3d, '#'}}, {@fowner_gt={'fowner>', 0xee00}}]}) openat(r0, &(0x7f0000000480)='mnt/encrypted_dir\x00', 0x181002, 0x58) 12:47:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000640)=ANY=[@ANYRESOCT=0x0, @ANYRES64, @ANYRES64, @ANYRESHEX, @ANYBLOB="f36fe15770e98afac6c96a7561ceac1dd634e500e5e7153148ae919b74be43e937154401db4d4d63cb431566108081c36ca6794737d8530c19e499", @ANYBLOB="780e9c925f0b62455de756cb87c79caf1d13e655dcb966ccdcbdf62d02529fe6755ede3a6d37b5b25e151123a0487c1d1e6c01000000000000006b919337e4a985a23aaa51d787826afe317b2d168433309e0e67c5c6af153c6e7331fe5168fa01697e835717e52b88ced4e2045e687a31bf98122bec0d43f55bddd9d751f301b95f37437950bd5da57efb469a43694a7fcde350"]) chdir(&(0x7f0000000040)='./file0\x00') setxattr$trusted_overlay_redirect(&(0x7f0000000480)='mnt/encrypted_dir\x00', &(0x7f0000000500), &(0x7f0000000540)='mnt/encrypted_dir\x00', 0x12, 0x3) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2, &(0x7f0000000840)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltgid}, {@posixacl}, {@access_any}, {@version_u}, {@dfltgid={'dfltgid', 0x3d, r2}}, {@version_9p2000}], [{@fowner_eq}, {@dont_hash}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@measure}, {@smackfshat={'smackfshat', 0x3d, '\',\'A'}}, {@seclabel}, {@pcr={'pcr', 0x3d, 0x33}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@appraise}]}}) setxattr$system_posix_acl(&(0x7f0000000000)='./mnt/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x5}, [{0x2, 0x6, 0xee00}, {0x2, 0x0, r0}, {0x2, 0x6, 0xee01}, {0x2, 0x3}, {0x2, 0x2, r1}, {0x2, 0x1, 0xee01}, {0x2, 0xd, 0xee00}, {}], {0x4, 0x6}, [{0x8, 0x2, r2}], {0x10, 0xc}}, 0x6c, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001bc0)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001b80)={&(0x7f0000000580)=@nl=@kern={0x10, 0x0, 0x0, 0x800000}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000980)="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", 0x1000}, {&(0x7f0000000600)}, {&(0x7f0000000780)="ba0c3d3f14ff3041df11579822edaf742320517a8fafab83656d0fc69feb29780f8663a714366d4ddfb83b51b7035940d8a23cccbd1ab7c7f2a112221465f4fc61121392ff6d4ee1e5c37081abd5ff03b75e8f6105d3d3baa72d13cb7e9cf64edd142236e3dd4db71e67e1", 0x6b}, {&(0x7f0000001980)="ee11f8f59a85242f9ad69048d7231ee54e652246464fc3481499cc4e302f46eb6fa008963c041163e8a0983211e836b89c829a0479a65dbd820b499f1c315ba9dcfa7c9ffb7fcce0c68ba996be9be63a31ac5154", 0x54}], 0x4, &(0x7f0000001a00)=[{0x50, 0x114, 0x9, "b0ae9c5e88750af86b2f3cbeafa9156a1b1ac718508fb959137d0e5de540a077707994f977bd82ece6637a0c02c3b47a843b0f0e6b58eb7881675f"}, {0xf8, 0x11, 0x9, "5e78f2f4d6e7f95d7be734ef2d4c2527e62a168ebf156fcd88600087e1ef0f03fc5822ff6db88a312138e20e06dc1814cc776fa5259a3b02e7bef5168c137f1ca9f29eabff2d393cb5e743bddd1cdeb8da32169fe069ba73fa3e7f44509273961d5b20df7b5e407fdcfe6d73c7f42127e5fdb65338de7be7a07d5d0416746d3847ea80af07401dd71b4755998b441cabdfd3b89733a55405f5805862b2e34ed83f709bc208af58e788177cf8e74a9b5521671ef77a33f76465dd66eaf0d672b1d9fd544c0876224cf225ca5f7316c6392ac0d744d37b52964f645c18887d8eb2720c3e91314a"}], 0x148}, 0x0, 0x0, 0x0, {0x0, r3}}, 0x6) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r4) openat(r4, &(0x7f0000000280)='./mnt/file0\x00', 0x10040, 0x100) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:47:00 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x8}], 0x40020, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='./mnt\x00', 0x110) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) syz_mount_image$nfs4(&(0x7f0000001c80), &(0x7f0000000240)='./file2\x00', 0x9, 0x0, &(0x7f0000000280), 0x2004824, &(0x7f0000001e00)={[{'.\\+'}, {'vfat\x00'}, {',[\x86+*\''}, {':'}, {}], [{@smackfshat={'smackfshat', 0x3d, ',[\x86+*\''}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@subj_role={'subj_role', 0x3d, 'vfa\xff\x00'}}, {@fowner_lt={'fowner<', r0}}, {@context={'context', 0x3d, 'unconfined_u'}}]}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) stat(&(0x7f0000000480)='mnt/encrypted_dir/file0\x00', &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 1448.095483] loop4: detected capacity change from 0 to 41948160 syz_mount_image$nfs4(&(0x7f0000000280), &(0x7f0000000440)='./file0\x00', 0x3, 0x7, &(0x7f0000001a00)=[{&(0x7f0000000500)="6a4644fdffdc0df44365bd5fbcf91d2bbdddd0c340e47a145b9e94e9ffe180c243719f5e887f9e7c30a3ed8487858d1987a22e20884184a2e6e0037fc1a3f2f93f785ca02c0bc6027f3a126a430761be99a2c97c6a540235195d968c7d1461f6963e194b9cb0063fed6f446dfe624cc1aedeedc8c99f7db95ff59945d73804f10dd3e5b882547cbaed213fd281a34e5e4598b37ea8140374d4c6cec73ced716175c0042c4f5c597338d066efeb0172cd460fdd7feddb24bd701c", 0xba, 0x7}, {&(0x7f00000005c0)="eb9f942a1b3d9184bafac42d8691375c75f4706cdc459397d4c30660a846a41aac92368ac3f030eb64d0e0a89c683675c3334a0d19982c5a6d708bf8c1ced39d4f17181f5d4908cc57523b16ac954be04d3e7492b4783f15e87a07c5056dca9d625bf342318f39341f7f3fc4a0a89b9f9bdbf984027f9a78de4f575e402a06cd003305cb4798bd5523287d8d1928fb125b06a7f53fc4a954d43e8df709ab8659d64f1dbc8c4beb85c81e3841a4a0c5a99cc9f217de418cb62bbc5555ddb5aab071094e107c6e184d40fa63c36dcf8b8fe75e9ee231050d8a5aca24be", 0xdc, 0xffffffffffff0001}, {&(0x7f00000006c0)="c403c648f38c563fcdfb0d99f4d2047a879d44cdbe8e9d715a0e8bcf57d832fe7ff359f81cf455e5a7f815e9a437aac457d9b189f52b9d8f65d37039ab563b8acda1557ae0dbfa9afca539da4555f123be0719c3e49647b0bfc2f3f4b98d68bb7f048f49732f9886ee01d33b8aaf66ec395fd362142dc6d704019ed4cf5ede5618f64097e3d2a6fa19655a4be90a25fb532ff3e4f7c2e364372f026791d295793e59c0deb22628638f77d45b5c56a4b030f9131293d495d39342565805830233080f1234fa871435686429998f0136a0a68919b11d1ac266e33648fa5172b55a722fa3b044", 0xe5, 0x8bd6}, {&(0x7f00000007c0)="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", 0x1000, 0x30}, {&(0x7f00000017c0)="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", 0xfb, 0x5}, {&(0x7f00000018c0)="9dbaacdc26bd68689285dc27678d5d558ec6bcbbbf11d44425b995fb98c5fc03e43c2b6b63d5560b5a44790db3a9792b2375dbf57cff95bbcf3e53e9cdff03531721f08f55c4dac890a9c6f0c949b64df1ce6827a5ebf833a33da82e971d3af2d0df8c9a3b5a1a8a1b59d8f8dd60f465216ff51a1878c9619b6a0aa67c", 0x7d, 0x80000001}, {&(0x7f0000001940)="f8de6b4cfb30dd1d41401ed41f20830808afbdecd6a74c398f3a05767126fc7d234399bd184206a7563bc365059b8daf9604ec09cd7d6dc094bac09c2ab42b2a244591173503b381df64277ea91f1e029a7dc3d42ef234290a9995b5303f300c49964d8a67e9280caf2939505bcc9db13340b9a1d87259cd0a66fadbafd73f7925b6d98ddc88", 0x86, 0xff}], 0x10000, &(0x7f0000001b40)=ANY=[@ANYBLOB="022c7375626a5f726f6c652c6f7b255c2cbd6f776e65723c", @ANYRESDEC=r2, @ANYBLOB="2c6f626a5f757365723d2c5b862b2a272c6f626a5f747970653d3a2c657569643c", @ANYRESDEC=r0, @ANYBLOB=',fowner>', @ANYRESDEC=r3, @ANYBLOB=',appraise_type=imasig,subj_user=,func=POLICY_CHECK,\x00']) [ 1448.103156] loop3: detected capacity change from 0 to 41948160 [ 1448.108477] loop5: detected capacity change from 0 to 1536 [ 1448.117113] loop2: detected capacity change from 0 to 41948160 [ 1448.129834] FAT-fs (loop2): Unrecognized mount option "00000000000000000000000ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ0xffffffffffffffffóoáWpéŠúÆÉjuaάÖ4å" or missing value [ 1448.144362] sysfs: Unknown parameter 'session' 12:47:00 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) recvmmsg(0xffffffffffffffff, &(0x7f0000001c80)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000200)=""/179, 0xb3}, {&(0x7f0000000300)=""/125, 0x7d}, {&(0x7f0000000380)=""/125, 0x7d}, {&(0x7f0000000000)=""/60, 0x3c}, {&(0x7f0000000400)=""/32, 0x20}, {&(0x7f0000000440)=""/3, 0x3}, {&(0x7f0000000480)=""/61, 0x3d}, {&(0x7f0000000500)=""/180, 0xb4}], 0x8, &(0x7f0000000640)=""/4096, 0x1000}, 0x4}, {{&(0x7f0000001640)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000016c0)=""/135, 0x87}, {&(0x7f0000001780)=""/167, 0xa7}, {&(0x7f0000001840)=""/118, 0x76}, {&(0x7f00000018c0)=""/149, 0x95}, {&(0x7f0000001980)=""/124, 0x7c}], 0x5, 0xfffffffffffffffd}, 0xff}, {{&(0x7f0000001a80)=@ethernet={0x0, @local}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001b00)=""/212, 0xd4}], 0x1, &(0x7f0000001c40)=""/55, 0x37}, 0x4}], 0x3, 0x40010001, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001d40), 0x143000, 0x0) openat(r0, &(0x7f0000001d80)='mnt/encrypted_dir\x00', 0x40, 0x80) [ 1448.169016] FAT-fs (loop5): bogus number of reserved sectors [ 1448.170006] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1448.175973] sysfs: Unknown parameter 'session' [ 1448.228180] loop5: detected capacity change from 0 to 1536 12:47:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:47:00 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='mnt/encrypted_dir\x00', 0x0, 0x0, 0x0, 0x308423, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:47:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000000)='./mnt\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:47:00 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)='\x00\x00\x00', 0x3}, {0x0, 0x0, 0x1001000a00}], 0x2200430, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') rename(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000200)='mnt/encrypted_dir\x00') [ 1448.258759] FAT-fs (loop5): bogus number of reserved sectors [ 1448.259585] FAT-fs (loop5): Can't find a valid FAT filesystem 12:47:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') sendto$unix(0xffffffffffffffff, &(0x7f0000000000)='*', 0x1, 0x48001, &(0x7f0000000200)=@abs={0x1, 0x0, 0x4e22}, 0xab) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:47:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1448.339579] loop1: detected capacity change from 0 to 41948160 12:47:00 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') openat(r0, &(0x7f0000000000)='./file0\x00', 0x40000, 0x67) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x4100, 0x20) [ 1448.360770] loop2: detected capacity change from 0 to 41948160 12:47:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000200)='./mnt\x00', 0xea, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000300)="32554fda333b956e96889bd4cbe44fbb324a0334d8e9402598aef7ed40c2ad952ec50028c9e67072ed6103abbb029712c6735651c36ad51c58ed8251f3b31cb1f9aeff2f0e8a081a56be4c41b17c5bab1f4c6a228d9a7649bc73d4581e9ddab73b0cd05c681b7d560092ad6e9736fd8247df67009d666c98d2821d3d68dcfb49d297ea98b39579017951113ef7f336666cffb2b38fde235877ea5e07e7bfeccab771f8f2d4215f58413d9c59caa7d7dc956633c4611056a5a3d2ff192bec66307009ff22f4d5486338f083b6da21fb0cdc0a9d1deb0500d05a2499f06ff3d024", 0xe0, 0x6b705ec0}, {&(0x7f0000000240), 0x0, 0xb46}, {&(0x7f0000000400)="530c6d5a7f1bb116ffd3683415521cf496f97712d2a45a45aade9c0b42a82c37029730a488fd4136e4d72d218f3043862dde836ffd9a976e5ef2d14516dd429076e87f41462d57eab017b9ce0006490f1643904747c353e5d9e9a604fc9e93a497bfeac38417199c503bc13f2de94f6f7eade2ab8a380d42b555737a4b", 0x7d, 0x1}, {&(0x7f0000000500)="6a495a2b8028b7c93d1a4aeb9e3b0ebb440801234c9b5bf450ddb9a7d62e62624e63d24106c0f681e4590eba32639f90658f913949224227cdda86c08dbf2a1be8fc31c53423458bb895d08ea23d8a9c769f75b776adc0fdf64151c72c4b3010772a7fdc1b27ce73f4315ece93f52b4b0d80ffcd2f6e23d1b59914b7c4ba10e1566e0ca90bff7e37a28dd8aaa301", 0x8e, 0x20000}], 0x210400, &(0x7f0000000640)={[{@i_version}, {@errors_continue}, {@prjquota}, {@min_batch_time={'min_batch_time', 0x3d, 0x6}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0xfffffffffffffff7}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@dont_hash}]}) openat(r0, &(0x7f0000000480)='./file1\x00', 0x408002, 0x108) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r1) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) futimesat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)={{}, {r2, r3/1000+10000}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=@ng={0x4, 0x11, "ddf670ac208ca3"}, 0x9, 0x1) [ 1448.368446] loop3: detected capacity change from 0 to 41948160 [ 1448.373578] FAT-fs (loop2): Unrecognized mount option "@" or missing value [ 1448.436948] loop5: detected capacity change from 0 to 41948160 [ 1448.474381] loop2: detected capacity change from 0 to 41948160 [ 1448.482318] FAT-fs (loop2): Unrecognized mount option "@" or missing value 12:47:00 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f00000018c0), &(0x7f0000001900)='./mnt\x00', 0x5, 0x3, &(0x7f0000001b00)=[{&(0x7f0000001940)="13ba159646efadf5fed5c3ef2c03c03294dd982afebd9c8f651359a47cd8264ebb9311c8085421fd679a4c02071b51a9fc4e059a6c3d54c6e8db3b1e6aa585c2f47301cc4d7618cbb9bcbac6363115f64f14b699dc82e7820ecfebba30ef14485c681e024c68c5047665859315d9060db071bb99ca552398a3ee50a13102359245bee53e9b666a6a7c48f4f94600c11f65534b9a64a48bfef5101f56320f1522e1392c927d13804713c88f58c58aa48f2624a2859a0ac41a4892c5b20c8b3dc1de954d05e5041610a21e47f7d92fdab72121e82cca5d442db95cd2b07f805e1b3f", 0xe1, 0xffffffffffff8000}, {&(0x7f0000001a40)="62e07cd05fc93a7fcc4d991b09f87ef309ab32ef63b02b43d195e7a7", 0x1c, 0x3}, {&(0x7f0000001a80)="54b42f35cc7e6124b13f08470396ef6365f68eefe60888f055ec1d159dc81da481f4d17336b6f15693f70f4b395c21a6ba0710d4f50324ff4e0d61795d2da811bf5969790e0be1c7d3741e4ec266f699c4ff8a47ec81ecc9e8edcfe84e61cccfd04d182b4f590c60eddbf3d10a933adf05b01c4666d88332317b20cdee8d", 0x7e, 0x400}], 0x210000, &(0x7f0000001b80)=ANY=[@ANYBLOB="5e6f748f2c00"]) setresuid(0xffffffffffffffff, r1, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) creat(&(0x7f0000001880)='./file0\x00', 0x43) fstat(r0, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000200)='mnt/encrypted_dir\x00', 0x6, 0x6, &(0x7f0000001640)=[{&(0x7f0000000240)="9118248f03d2d17dbbafced4ea4e0daf88a52c2f07795944dead158e85b0e0ec46d3776a48de7be2ae0ae221d90ae6f2e216e76f4c629202b38537d2f5741e88da91aa", 0x43, 0x7}, {&(0x7f0000000300)="8240b993de7f1e7ae3ca9aaec694816f9a3c2e32d3fc985d4df39aa2c5c845ad2ddda67e50204f05e914ca374c351c1f26699022b1e424d7b20b9234fc4104064d9ea9a6acd4168a1dffa482f09f9ee1c34d90f4d4707f51b309cabb5bbcb157dd7c6ce4c7e0b43f1a32c68a4640580a5bab90809780116a5e82b83021a5ab6393998f840f91091840b06a55bb8a6aac740ded4782ba9b2c0d653585ad37eb9876dcbaf612a71564421f9a6e913a482987e3808a65dc46437fdd97164ceca08253a235b6b79aad0a0053bfad41b5a473", 0xd0, 0x4}, {&(0x7f0000000400)="345338073aee38aeff37fd9c3a22651b162d1d70cfb650d8ffef1ae4c2bfb5528bee8c41f81ff08648ea5f610d3fc0359121d960de4a24dc6c8904fc7ae5a5722c9530afae40ee97e73dcc89d8fe009a21cd5a19276a1902166b7b62e7c71b73d7a5e6f057b1d98033c95e0d3c84982d4366e2adb37ffaef55a8464fafbca29f6ab1043365e8a2", 0x87, 0x3f}, {&(0x7f0000000500)="ab75", 0x2, 0x2}, {&(0x7f0000000540)="16202415b8b9a7d09d2cc925567dc6294ede88ac752fd74ced0bc87a193959773a22c67eed5904d2fc0792ad47a9babf234ca564be34e266e4c4369881a914958cf9df3a84b7f81abf8c340c6fae74d3aa760b57e7c0778b5d9c01a424b77752b9ea40ad68605afec55a96db8d528a89e0cfaad6c33fc5dcc05cc459bfd17e3e595fe3b8d89d0cfe3dbd986e08caaea1726ee88f939ffc6a2ce5a16d78d23a98ea9a46d451d0d85a2025ac325c05d4ab4174530a296d4a9e5b9daa09f21f9bac76c37c6ac545d4128c153894091923e437448648daaa315a46f2498359645fb705bfd22cc55e29d8eeb98ab4d2c2cb729661", 0xf2, 0x8}, {&(0x7f0000000640)="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", 0x1000, 0x7}], 0xb, &(0x7f0000001780)={[{@huge_advise}, {@uid={'uid', 0x3d, r1}}, {@huge_never}, {@huge_always}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x74]}}, {@mpol={'mpol', 0x3d, {'bind', '=static', @void}}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@obj_role}, {@fowner_lt={'fowner<', r2}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@euid_gt={'euid>', r3}}, {@fsname}]}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r5 = fcntl$dupfd(r4, 0x0, r4) openat(r5, &(0x7f0000001bc0)='./file0\x00', 0x82, 0x108) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r6) openat(r6, &(0x7f0000001c80)='./mnt\x00', 0x40000, 0x18) 12:47:00 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0xc00, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file1\x00', 0x110) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x2) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r0}}, './mnt\x00'}) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) [ 1448.490283] loop4: detected capacity change from 0 to 41948160 12:47:00 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) copy_file_range(r1, &(0x7f0000000200)=0x100, r0, &(0x7f0000000240)=0x1, 0x0, 0x0) [ 1448.599069] loop7: detected capacity change from 0 to 41948160 12:47:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1463.031486] loop4: detected capacity change from 0 to 41948160 [ 1463.063196] loop5: detected capacity change from 0 to 41948160 [ 1463.070121] loop7: detected capacity change from 0 to 41948160 12:47:15 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000340)='ext2\x00', &(0x7f0000000380)='./mnt\x00', 0x3, 0x4, &(0x7f0000000680)=[{&(0x7f00000003c0)="85520304d6b104068132d2f0e6fd76efe2eb3f8e25b8146d6abf8970ac94a7ebf30e5c5d1e1da4cc79ef79cffc3410a8c16c303fcdc84fcf44c562160034e37499ee", 0x42, 0x284fe501}, {&(0x7f0000000500)="27ad6fc2950942efa1fca716735309126fdb1240a8bbde77cbf15c9e1a311606b72aeeec142f68ec250fae1892fc29b75c0e5d21e7fbfb105866713c15a0a8d93093ac88a15a0aa23a37a44fd7ac15b316eb19bcfb73dd309abae476a3ba21455b7e70e06ffee0576d50feb6c2fdb55d79e3ddfa6acc89dbe4cdcf8e031096e5604004cbe33cba977b641e55583ea5069ee5dab04e0a60d62765c27d3494a910b409d4952ad120c1777472", 0xab, 0xfff}, {&(0x7f0000000440)="6979b8488a0f90dadfcafd45b98af62637c78f1b0ee51ee42e80ef281c90a17691655746d9a4ed189ed06101d0e4bc", 0x2f, 0xff}, {&(0x7f00000005c0)="cf68c9d3739446c0f1b9d128815e00512c7a7dbd33c144efe7948e9267e46440534f634fd6eccd8eaa4b9504598fa9a4b2b7a6d191b9abd524d210aba9f8ca70ff83ea6a8bcff9d9a489614f681a058b349118d5e0706d5e7e81a13ffd8a0ffae8d09421908cfc85f8c267b730129ccf9e111eb90baee6f06619c450d3fb50f90a42a93e63fe4a0589e1d0877b40c91be23e0c60c7c1400281745c3c4ab40de0ba88a2cf2dc07983eded215c0ff6", 0xae, 0xffffffff}], 0x800, &(0x7f0000000480)={[{@usrjquota_path={'usrjquota', 0x3d, './file1'}}], [{@smackfshat}]}) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000240)={[0x7]}, 0x8, 0x80000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r2) renameat(r1, &(0x7f0000000280)='mnt/encrypted_dir\x00', r2, &(0x7f0000000300)='./mnt\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x401}}, './file0\x00'}) openat(r3, &(0x7f0000000200)='./file0\x00', 0x8543, 0x2) 12:47:15 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) unlinkat(r0, &(0x7f0000000000)='./mnt\x00', 0x200) chdir(&(0x7f0000000040)='./file0\x00') write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="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"/2835], 0xb13) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r1, @in_args={0x3}}, './file1\x00'}) getsockname(r2, &(0x7f0000000400)=@vsock, &(0x7f0000000480)=0x80) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2, &(0x7f0000000840)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltgid}, {@posixacl}, {@access_any}, {@version_u}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@version_9p2000}], [{@fowner_eq}, {@dont_hash}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@measure}, {@smackfshat={'smackfshat', 0x3d, '\',\'A'}}, {@seclabel}, {@pcr={'pcr', 0x3d, 0x33}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@appraise}]}}) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='mnt/encrypted_dir\x00', 0x1, 0x2, &(0x7f0000000380)=[{&(0x7f0000000280)="433f77db24bc454a832b1a091bea01468b9f3956ba6c36b3de9f198db841b868e990cce7be9094ba40f6cad2ce6cf99450bd", 0x32, 0x7}, {&(0x7f0000000300)="a15ab341b936e2b803168a41c4817d522e867a89893538e7ae4053a196d093c4c70583326b742426c8a055bc5146ba12b8b045095b70a36a6c659a410769c0ee20f97d759f64311a1145713b1dbd9efdbacb2f0380fd0f558f3818430c9a4883c765f27016f414a28a749777434fe36fa24b75d9eac185e1f45c0590", 0x7c, 0x6}], 0x4, &(0x7f0000000500)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {}, {@nr_blocks={'nr_blocks', 0x3d, [0x70]}}, {@mpol={'mpol', 0x3d, {'interleave', '', @void}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x39, 0x70, 0x6b, 0x78]}}, {@gid={'gid', 0x3d, r3}}, {@mode={'mode', 0x3d, 0x1000}}, {@mode={'mode', 0x3d, 0x7}}], [{@smackfshat={'smackfshat', 0x3d, '(\f!-}'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@obj_user={'obj_user', 0x3d, 'vfat\x00'}}, {@seclabel}, {@fowner_gt={'fowner>', 0xee01}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}]}) 12:47:15 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getresuid(&(0x7f0000000300), &(0x7f0000000340)=0x0, &(0x7f0000000380)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000200)='mnt/encrypted_dir\x00', 0x80, 0x1, &(0x7f0000000280)=[{&(0x7f0000000240)="375eb9d4fd8b", 0x6, 0x5}], 0x2220000, &(0x7f00000003c0)={[{@lazytime}, {@noinit_itable}, {@auto_da_alloc}], [{@fsuuid={'fsuuid', 0x3d, {[0x30, 0x35, 0x35, 0x0, 0x30, 0x63, 0x63, 0x31], 0x2d, [0x64, 0x61, 0x62, 0x66], 0x2d, [0x35, 0x64, 0x32, 0x31], 0x2d, [0x37, 0x38, 0x63, 0x63], 0x2d, [0x35, 0x61, 0x33, 0x38, 0x37, 0x64, 0x4343e57a2084a212, 0x33]}}}, {@fowner_gt={'fowner>', r0}}, {@smackfshat={'smackfshat', 0x3d, 'vfat\x00'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@obj_user={'obj_user', 0x3d, '\x01'}}, {@smackfshat={'smackfshat', 0x3d, '\x00'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:47:15 executing program 2: chdir(&(0x7f0000000040)='./file0\x00') link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='mnt/encrypted_dir\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x89081, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0xf3) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x6) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') lremovexattr(&(0x7f0000000080)='mnt/encrypted_dir\x00', &(0x7f00000000c0)=@known='user.incfs.metadata\x00') 12:47:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2048000, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:47:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_read_part_table(0x1ff, 0x6, &(0x7f0000001600)=[{&(0x7f0000000300)="cc2762bb9207e19b353d8aa8a05bfe4b288e51effc1130d4d06827a1f0871c722a903614350114941e5af60022be94c5a5283c064d5c8339afafb9d99887feee636c8f0d72d3fe5e4b0ae8097765bf94d9ba3eff5aee54f0613bfa0df3b6d21dc50a85d07304c64d99556f76cb723732e38e222bad050735b84620bbfb928a92c7699a7423638e1b0dea9b7d9efaadee76fc934b8c8d4580659df4482b206e746844640752410b60c67456000106cb00af163edf413ba562f00682b874b4984edac30ddb7a7e604138", 0xc9, 0xfff}, {&(0x7f0000000500)="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", 0x1000, 0x276f}, {&(0x7f0000000200)="fb858e04193c33dbe58ba1e6083b0ca4d1e7af0b1d82eb220236f03450f2ca9a2d7ebac3f111f0e85c303f7a56fc8556083b428185eb366397ba39733dccf5147e462a30de42a67090420136778743e6b1c09db246504340e9b8", 0x5a, 0x4}, {&(0x7f0000000000)="b4dd18269e32bd29496836ac9486a4959dfaaca80a13efc8b8e28e85e85a93e599432bfbc851561a576f28", 0x2b}, {&(0x7f0000001500)="ee9f4308fb66fa86f13d3c9fec63d11f2dfdc6ed5d8c457f9fa70acb6c9964aa2080784794d64ef1329d9e26a3da96ce3f9e0f0dc6230f19b2be6869433e23004095a96e515f0164b16a198c0d57f5da90a74d4189af9b3dead48f4e1526eabd286019a003968d3bfc6e6b8de6e32ce89daadb42803ba7133f5399e56d8018a74a8ad05c39b80f08412e318ec2fd2554c348fa0b688ec573d5f84acf2396f8d492341ee44de01130d9de90a241ed1ae34a1ce4bf82f0b4c63e692946c54a485e207322c3f199c71fc7c242252d7c54aa27950773865057f275d5c24ce7c3955e02b3c2c43747cc06e184", 0xea}, {&(0x7f0000000400)="835e4ffe7a51d68436ba87c9d71ec6c6b5fffb3e99024a210051a36527ab972bb303fa96aff4e4b613209e34e64c53ebd87b82b74ae942e7be181155234e4cad06efabfb2f732498287d190906b410b19900d87b149f0425186962ed7514d03c018f39dc22212de4c3f896bc25418f1162254c47f378925d268ffb290c49b8035e5126e12546a1e3b2913e2eccbdb19e1643fe0ace23cce731f9ff", 0x9b, 0x20}]) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:47:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801cfc96d368400f801", 0x17}, {0x0, 0x0, 0x1f}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r0) openat(r0, &(0x7f0000000000)='./mnt\x00', 0xc0000, 0x18e) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1463.097370] loop0: detected capacity change from 0 to 41948160 [ 1463.114629] loop3: detected capacity change from 0 to 41948160 12:47:15 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='mnt/encrypted_dir\x00', 0x3, 0x0, &(0x7f0000000180), 0x820008, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='mnt/encrypted_dir\x00', 0x100000000, 0xffffffffffffff75, 0x0, 0x12000ae, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1463.155245] FAT-fs (loop1): bogus number of reserved sectors [ 1463.156244] FAT-fs (loop1): Can't find a valid FAT filesystem 12:47:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000200)=@ax25={{0x3, @null, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000300)="23b6ae38ea0b7e282d8392f3e5c2558861ce70d6ff66d15dd1c07b8b17d43154de027546009afb122970eddb26ff03eb5b05b99d7b947734c0c053638ee4f2cc5727511eefbdaa3ab81f9994fae5a4d95f5bf596461203ac7c8f6df9047ae98c75703ef6d4cc3835e27881187170a129fe433bf84cf5673b833d65aded5627bdf7966faa7183e03b6ef762a47f8bc7757c01f1e472a239eeaf1f1ec749589594c5660a72b4ae8c33d601f2ae", 0xac}, {&(0x7f00000003c0)="82088216698afc1999d5052a21b1d9b93a8d421549f67761882c3473a2a0bb363ec91c02849f6c41bcb65b2e9419f608d237b4d37d17f20a68acc7edd14297e1614ef421ba274e611785cdbd38dc7a694df179f63e3eca6e9cbd7820914622dae4b1392b1b7132f6fed835c4afcb0109ab22ed138c81de3989f50465d0910d5589b690e6c31e400a97d4311f45c3af1680e443", 0x93}, {&(0x7f0000000500)="9cfc962c3af34bc8f3c159b748fec3cfc9bbff86c196bbe1ed0b6e38d272bbcf71d2dbf04f0ac09054df45a4feeecca947d977c714c3869fbed02716bbf844c6ebf88ca8ac999d4e6636846b646efa0f79b9f2e02f8245461d3974ceb4c08fdc26b2991fea75ef9b6bb1ea0ba3eb48f2917d87a7918d22b04baa5e2906584e4ed999f38475efbd94f44b149a2948413eb964f28c0e4998495daf3173f4a846459b288af484480a4278cc419184419ae0353a4b45ea938004c4188388a77b217b9d23f8891c4d75b934f9a486235aa22858517d752416f4098fd66bd3b6bdee6b8f3d52ff331204d05a7be062c14d2b64d4eb", 0xf2}, {&(0x7f0000000000)="d402737316f918fc2117c9", 0xb}, {&(0x7f0000000600)="f6cb8ebcb0a32dc883015a35c5d8073cd9419a75a84fa0e50f6580e9cf4df1e88318b47b7d36756c3da8a97121a0cea49b6cdb2295c1a8bd481a44ef66a55902e7b4f0e985a2a92c2ccf5973d93e1fb94cfb10278140328dabbd835d", 0x5c}, {&(0x7f0000000680)="721179c47d2bebf699d0c34a06a2e0d22e298de47a6a84f7275b499abf142bc6600028aaff925274a8a264fea543b6141d30e923dd14bcb242aa09d3bac41ef4d2e9eeb3c82310d22c3365d81be87f89d7aa134b9162d70d92a79cf7f6486c69114d37992c9c984720069f10051e9536f8fdb43dfe4e726e87e79c6c511a8ae07eb2e9c7b6af3fce9f88d63a5c5bac4cf4ad2ec82bfad92db394353f651d6e3d97e8fadd169954d564ed39b648652a2d6c2ab4", 0xb3}, {&(0x7f0000000280)="19f01f417a4099003475c4b4fad2e1988334511e3b81f11bc64bc91e47c7807d87e1985a50352a505b2ac4a9003c6c30ea4b5f4d2fde62", 0x37}, {&(0x7f0000000480)="2d3406fab3989b238e6f7c234c10d6d54bf44046d91b4399ead6aa81522672b93933a734a66a36592f6c427e197874bbc37e344d74ce49ca9c25491643", 0x3d}], 0x8}, 0x48051) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1463.192708] loop0: detected capacity change from 0 to 41948160 12:47:15 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66618400f801000000000000000000a9cfa48c37e39b6292fe2882fc0e12c302fcbb6ba906c63ec817cc1b", 0x33}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r1) openat(r1, &(0x7f0000000140)='./file0\x00', 0x8000, 0x148) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1463.241991] FAT-fs (loop1): Unrecognized mount option "./mnt" or missing value 12:47:15 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r1) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x7af}}, './mnt\x00'}) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1463.282616] loop2: detected capacity change from 0 to 41948160 [ 1463.319366] loop7: detected capacity change from 0 to 41948160 12:47:29 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x22) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) syz_io_uring_setup(0x2d5, &(0x7f0000000200)={0x0, 0xb90e, 0x20, 0x1, 0x1d3}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000000000), &(0x7f0000000280)) setxattr$incfs_size(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380), &(0x7f00000003c0)=0x5, 0x8, 0x1) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:47:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000000)=ANY=[@ANYRESDEC]) chdir(&(0x7f0000000040)='./file0\x00') r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_io_uring_setup(0x6fa6, 0x0, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8000}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './mnt\x00'}) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:47:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000003, 0x12, 0xffffffffffffffff, 0x10000000) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) syz_io_uring_submit(0x0, r1, &(0x7f0000000280)=@IORING_OP_TIMEOUT={0xb, 0x3, 0x0, 0x0, 0x4, &(0x7f0000000240)={r2, r3+60000000}, 0x1, 0x0, 0xa5ea19387b14572a}, 0x28) r4 = syz_io_uring_setup(0x6f87, &(0x7f0000000080)={0x0, 0x3, 0x2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) close(0xffffffffffffffff) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000002, 0x10010, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x3}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r4, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r4, 0x8000000) syz_io_uring_submit(r7, 0x0, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd_index=0x1, 0x0, 0x0}, 0x80000001) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './mnt\x00'}) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r6, &(0x7f0000000380)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, r8, 0x0, &(0x7f0000000340)='./file0\x00', 0x26, 0x101000, 0x23456, {0x0, r9}}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mkdirat(r0, &(0x7f0000000000)='./mnt\x00', 0x10) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:47:29 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000300)=ANY=[@ANYRES64, @ANYRESHEX, @ANYBLOB="0923ccce25def10decec97a1f0f486aa0887a01d52a0698566ccdd165e7c79fb9329890acb48fee1223fd91ec022a7deb9c045d3660476bc00b540c054102dd9069d3f75eb2b9451f83bbb4beb5d8b62f7d041bd136c34f9280373d1ed4e22531876609f2a9f0d0f52b0ec39614fad7dad7ed4aa898e4822c6edc8a8c5513e7f7359010000003dd5e0f6fbc058681e260a8de1960103753cedf2cbde51f4a3b809b396add0e20dc3f64eb7374cf2460ad30de383140c69e74220e50f2aee56bcfeed7876432d1e0f2692c4293c62ff3c23ebaf7a393174d03736426b86263d4389f2f5ec028c2f14bc05f1bcdd"]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r1) futimesat(r1, &(0x7f0000000000)='./mnt\x00', &(0x7f0000000200)={{0x0, 0x2710}, {0x0, 0xea60}}) chdir(&(0x7f0000000040)='./file0\x00') mkdirat(r0, &(0x7f0000000240)='mnt/encrypted_dir\x00', 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x444801, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x3}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r3, 0x0, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) syz_io_uring_setup(0x58d5, &(0x7f0000000500)={0x0, 0xcc3c, 0x34, 0x3, 0x336, 0x0, r1}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000480), &(0x7f0000000580)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000600)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)={0x77359400}, 0x1, 0x0, 0x1}, 0x4) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f0000000440)={{0x1, 0x1, 0x18, r5, {0x6}}, './file1\x00'}) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:47:29 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_io_uring_setup(0x6f87, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x3}, 0x0) syz_io_uring_setup(0x69e7, &(0x7f0000000200)={0x0, 0x24bf, 0x0, 0x3, 0x3f}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000280)=0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000340)=@IORING_OP_POLL_REMOVE={0x7, 0x0, 0x0, 0x0, 0x0, 0x889c7cb2ceb4d95c, 0x0, 0x0, 0x1, {0x0, r4}}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000300)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd_index=0x8, 0x0, 0x0, 0xffffffff, 0x2, 0x0, {0x0, r4, r0}}, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000380)='./mnt\x00', &(0x7f00000003c0), 0xfffffffffffffffc, 0x0, 0x3) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:47:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000480)='./mnt\x00', &(0x7f00000007c0)={0x80000, 0x1, 0xf}, 0x18) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000800)=ANY=[@ANYBLOB="010000000100000018000048", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./mnt\x00']) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000200)='./mnt\x00', 0x401, 0x6, &(0x7f0000000680)=[{&(0x7f0000000240)="d12da617098986171529ab9cda95eb8f7680a68d7d2ce2dd4a93b9b24fbc47219ba163ca95427187c22f4b0e337bd043af4207a2494f04a8e050f8bb72e8bb73516a7d1f5d1dd7937fd73281178b0ee3031d6cda90b4fd081ca1e0b3f17bbe13e5d4d6", 0x63, 0x7}, {&(0x7f0000000300)="f53d40455afa8e1b9b2dacaf09d1e1a83798c7793f9707dba43e28ac9a14b10c0a9ca0610a45bf28c2707628b061fe4dbca39b1c89513db0ae5d2a37b04368e2444946c942e5989d14c215f8fad945e201dd89d80944614c069795543cdfae44ba0d76c3df8f6b687d1cbb96c7aaca300c4a231d6252d9", 0x77, 0x2}, {&(0x7f0000000380)="8008eae8d0096b0bc169769523926bad1185946c3fc09cf10ad5ad67e3d8dc1ebdf376a9dad6190e5237411e43e305983d3bd468693a1a71f6f9ec518594dc05f391fc204a5d0d63fcf6e9943ed92386e728a6b8d9bbb0dba3eda144e30fba0cb3df35685d40df544bcdcd83eac18fca75f98dd5804c92c4b4f560f51317faef7a74c6377296c933b818d9b0916d78c806bac23c520969759fbbfd85f8041519f77b9a893e5230b41a9d42646e13c1863ee07e417c00e033d3bc36addc5759816d104ca3fe36c9", 0xc7, 0x85}, {&(0x7f0000000500)="17fba3d2c2e829d12df20ff2d954b9a2bc2b81722b4d557a44286b1d694d24bed05348aee2f16134274dadd18a5bd35fdc0327fb23eb19b39182ff97dba4877358d32db5d1a1b75debd48c601817b61b9cfaa9fc8c3003e54895a108e938f76034375aed1ab2fac93245cee1c48d9ce2065ca9b97b6fe813e60b7aba99d00358", 0x80, 0xa}, {&(0x7f0000000580)="ad22bb7cf12a458983b35b283877019a59d0babd6201a4cabf8c522988a3b082f2e4d60d70d9a4f32095686b6bdb09455b83dd21f6f44582332716f3bab764d51be26ef302", 0x45, 0xdc}, {&(0x7f0000000600)="19b8a75d47d4fcacf669f0370c71fac5811e98bc9f8146a7415d706296cc8be4e3514097c661d95f75224ec33d1ebd49ae2fa7816db61f708df80d38e3181de3b7ecc81fbba1e2259b4bf3c4", 0x4c, 0x8}], 0x0, &(0x7f0000000740)={[{'\\!$,,'}, {'\'#'}, {'vfat\x00'}], [{@hash}, {@smackfstransmute={'smackfstransmute', 0x3d, '{-'}}, {@audit}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '\\'}}]}) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:47:29 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r1) r2 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000380)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000000c0)="eb3c906d70008400f80100"/23, 0x17}, {0x0, 0x0, 0x5}], 0x310020, &(0x7f00000003c0)=ANY=[@ANYRES16, @ANYRES64=r0, @ANYRESDEC=r1, @ANYRESHEX=r1, @ANYRESHEX=r1, @ANYRES64=r1]) chdir(&(0x7f0000000040)='./file0\x00') mkdirat(r2, &(0x7f00000002c0)='./file0\x00', 0x2a) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x10800, 0x84) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r3) openat(r3, &(0x7f0000000280)='mnt/encrypted_dir\x00', 0x10000, 0x36) mkdirat(0xffffffffffffffff, &(0x7f0000000140)='mnt/encrypted_dir\x00', 0x8) mount$9p_fd(0x0, &(0x7f0000000000)='./mnt/file0\x00', 0x0, 0x808440, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:47:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x17, 0x2, {0x7, './file1'}}, 0x10) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x66200, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r0) mkdirat(r0, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) openat(r0, &(0x7f0000000200)='./mnt\x00', 0x100, 0x91) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1477.642870] loop0: detected capacity change from 0 to 41948160 [ 1477.646627] FAT-fs (loop0): Unrecognized mount option "18446744073709551615" or missing value [ 1477.649290] loop3: detected capacity change from 0 to 41948160 [ 1477.654904] loop1: detected capacity change from 0 to 41948160 [ 1477.658602] loop7: detected capacity change from 0 to 41948160 [ 1477.664289] loop4: detected capacity change from 0 to 41948160 [ 1477.671104] loop2: detected capacity change from 0 to 41948160 [ 1477.683305] loop5: detected capacity change from 0 to 41948160 [ 1477.693569] FAT-fs (loop5): Unrecognized mount option "ÿÿÿÿÿÿÿÿ0xffffffffffffffff #ÌÎ%Þñìì—¡ðô†ª‡ R i…fÌÝ^|yû“)‰ [ 1477.693569] ËHþá"?ÙÀ"§Þ¹ÀEÓfv¼" or missing value 12:47:30 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0}, './mnt\x00'}) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) pread64(r1, &(0x7f0000000200)=""/9, 0x9, 0x1) [ 1477.757352] loop5: detected capacity change from 0 to 41948160 [ 1477.772081] FAT-fs (loop5): Unrecognized mount option "ÿÿÿÿÿÿÿÿ0xffffffffffffffff #ÌÎ%Þñìì—¡ðô†ª‡ R i…fÌÝ^|yû“)‰ [ 1477.772081] ËHþá"?ÙÀ"§Þ¹ÀEÓfv¼" or missing value 12:47:30 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x8000, 0x161200) execveat(r0, &(0x7f0000000200)='./mnt\x00', &(0x7f0000000240), &(0x7f0000000300)=[&(0x7f0000000280)='-@\':@\x00'], 0x1000) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file1\x00') 12:47:30 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x52) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') getxattr(&(0x7f0000000240)='./file1\x00', &(0x7f0000000280)=@random={'user.', 'vfat\x00'}, &(0x7f0000000300)=""/192, 0xc0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r1) openat(r1, &(0x7f0000000200)='./mnt\x00', 0x2caa40, 0x160) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/asound/timers\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000440)={@id={0x2, 0x0, @auto="3214165382cdb5d3209b7a61ff8674aa"}}) openat(r0, &(0x7f00000003c0)='./mnt\x00', 0x800, 0x0) [ 1477.889428] loop7: detected capacity change from 0 to 41948160 12:47:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') openat(r0, &(0x7f0000000280)='./file0\x00', 0x8000, 0xe1) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) mount$9p_unix(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x1000409, &(0x7f0000000300)={'trans=unix,', {[{@dfltuid}, {@version_u}, {@fscache}, {@cache_loose}, {@noextend}], [{@obj_role={'obj_role', 0x3d, 'vfat\x00'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@dont_measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x38, 0x21ba900228e98046, 0x36, 0x32, 0x38, 0x0, 0x33], 0x2d, [0x36, 0x61, 0x33, 0x36], 0x2d, [0x36, 0x63, 0x3e, 0x63], 0x2d, [0x35, 0x30, 0x32, 0x35], 0x2d, [0x35, 0x7, 0x36, 0x31, 0x30, 0x32, 0x30, 0x30]}}}, {@uid_gt={'uid>', r1}}, {@obj_type={'obj_type', 0x3d, 'vfat\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, '#,'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}}) [ 1477.903898] loop1: detected capacity change from 0 to 41948160 12:47:30 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = syz_io_uring_setup(0x3250, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) io_uring_enter(r1, 0x5635, 0x7954, 0x1, &(0x7f0000000300)={[0x1]}, 0x8) fsetxattr$security_capability(r1, &(0x7f0000000000), &(0x7f0000000200)=@v2={0x2000000, [{0x1000, 0xd9}, {0x6, 0xfffffff7}]}, 0x14, 0x3) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./mnt\x00') unlink(&(0x7f0000000240)='mnt/encrypted_dir\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r2) sendmsg$NL80211_CMD_DEL_KEY(r2, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0xac, r3, 0x8, 0x70bd25, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x3, 0x37}}}}, [@NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x2}, @NL80211_ATTR_KEY_SEQ={0x13, 0xa, "dcf2d6afd8db4248262e8b267df414"}, @NL80211_ATTR_KEY_SEQ={0xc, 0xa, "5fa3a30e14d543ce"}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}, @NL80211_ATTR_KEY={0x58, 0x50, 0x0, 0x1, [@NL80211_KEY_SEQ={0xd, 0x4, "ed7f1f7bb923911893"}, @NL80211_KEY_IDX={0x5}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_DEFAULT_TYPES={0x20, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x20000080}, 0x90) close(r2) openat(r2, &(0x7f0000000280)='mnt/encrypted_dir\x00', 0x0, 0x70) 12:47:30 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400), 0x2c4180, 0x0) fallocate(r1, 0x2, 0x5, 0x3) lsetxattr$trusted_overlay_upper(&(0x7f0000000280)='./file1\x00', &(0x7f0000000300), &(0x7f0000000340)={0x0, 0xfb, 0x88, 0x1, 0x2, "9591e3bf0e72c7d85c39ac322fbbae40", "d5f0fa8f5077d9d12bfc8981502f3f4a46f9957bb3ceb5fe54ef40a2ddb19591a8da86b6efed75160088288b66cb6804992f1de9fc41dc1e044284b2d8ad57ff92bc2affd76ba06fb5526c8409f1956ab76d1422e86a234886b01716414d185a6bd159f18f76d0cc01092d8b75f84e2acd5286"}, 0x88, 0x5) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0}, 'mnt/encrypted_dir\x00'}) rename(&(0x7f0000000000)='./file1\x00', &(0x7f0000000200)='./file0\x00') 12:47:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') setxattr$trusted_overlay_opaque(&(0x7f0000000000)='mnt/encrypted_dir\x00', &(0x7f0000000200), &(0x7f0000000240), 0x2, 0x3) 12:47:30 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000000)='./mnt\x00', 0x86182, 0x102) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:47:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r0) mknodat$loop(r0, &(0x7f0000000240)='mnt/encrypted_dir\x00', 0x10, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = syz_io_uring_setup(0x6f87, &(0x7f0000000080)={0x0, 0x8f40, 0x0, 0x0, 0xfffffffc}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x3}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_mount_image$ext4(&(0x7f00000001c0)='ext2\x00', &(0x7f0000000340)='./file1\x00', 0x800, 0x1, &(0x7f0000000480)=[{&(0x7f0000000380)="7c30141efd2fe5fd8547071723f43e6db87da95518f8dcbd9c0bfb88e3530ffe7808706454d32e28ddfcd257dac28aaabea9252ed9b1ca19f6040d9c222508c1976abd44b59a0813cc57bc53c86c49786561aaaa903cfae7a9a2cca1459eeab022f87bdbb201fef50b51ca20c6278874829ec957c2b0bf8c7dda7add3afcf71bd73b51d47eba1fb24d109a99b88c1c47012de7cab51f3f44deabf6c7fe43d1dfc35da1ea37e72ff07f675dd5eeebab9a1a7fb01a73063176e0fb79fccb2e18ee0b1b044f7b826b998f125ae4318b", 0xce, 0x2}], 0x10000, &(0x7f0000000500)={[{@debug}, {@data_err_ignore}, {@dioread_nolock}], [{@smackfstransmute={'smackfstransmute', 0x3d, '}#'}}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@subj_type={'subj_type', 0x3d, '#'}}, {@obj_user={'obj_user', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0x2}}, {@measure}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) syz_io_uring_submit(0x0, r3, &(0x7f0000000200)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x3, 0x0, @fd_index=0x5, 0x10000, 0x0, 0x200, 0x7, 0x1}, 0x80ea2b) openat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x2000, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000280)='mnt/encrypted_dir\x00', &(0x7f0000000300)='./file1\x00') [ 1477.966078] loop4: detected capacity change from 0 to 41948160 [ 1477.971305] loop2: detected capacity change from 0 to 41948160 [ 1477.992090] loop5: detected capacity change from 0 to 41948160 [ 1478.020483] loop0: detected capacity change from 0 to 41948160 [ 1478.060536] FAT-fs (loop0): Unrecognized mount option "mnt/encrypted_dir" or missing value 12:47:30 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000200)='mnt/encrypted_dir\x00', &(0x7f0000000240)='securityfs\x00', 0x1000020, &(0x7f0000000280)='vfat\x00') mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:47:30 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1478.082795] loop7: detected capacity change from 0 to 41948160 12:47:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x9}], 0x2000420, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:47:44 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0x30) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='./file0\x00') mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='mnt/encrypted_dir\x00', 0x300, 0x90) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:47:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:47:44 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f00000001c0)='./mnt/../file0\x00', r0, &(0x7f00000003c0)='./mnt\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) listxattr(&(0x7f0000000200)='./mnt\x00', &(0x7f0000000240)=""/114, 0x72) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./mnt\x00', 0x40000, 0x115) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@known='trusted.overlay.opaque\x00', &(0x7f0000000380)=""/21, 0x15) 12:47:44 executing program 6: r0 = eventfd(0x4) ioctl$FITHAW(r0, 0xc0045878) io_setup(0x7, &(0x7f0000000340)=0x0) clone3(&(0x7f0000001500)={0x200000200, &(0x7f0000000380)=0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400), {0x1c}, &(0x7f0000000500)=""/4096, 0x1000, &(0x7f0000000440)=""/30, &(0x7f0000000480)=[0x0, 0xffffffffffffffff], 0x2}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r3) io_submit(r1, 0x2, &(0x7f0000001680)=[&(0x7f00000015c0)={0x0, 0x0, 0x0, 0x2, 0x7, r2, &(0x7f0000001580)="c54de2234b06de", 0x7, 0x2, 0x0, 0x3, r0}, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x38, r3, &(0x7f0000001600)="b87e5fc980fda85a7c2a29ea6a60d339bb3140778069c78fe83a379d2a14e671c27248314aa4e81ab3935409525d8d6820215cbe6ce081163c14369d1ecbce", 0x3f, 0x8, 0x0, 0x2}]) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000200)=@loop={'/dev/loop', 0x0}, &(0x7f0000000240)='mnt/encrypted_dir\x00', &(0x7f0000000280)='v7\x00', 0x108000, &(0x7f0000000300)='vfat\x00') rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r4) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) umount2(&(0x7f0000000000)='mnt/encrypted_dir\x00', 0xb) 12:47:44 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@private}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x20880, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@dont_appraise}, {@smackfsfloor={'smackfsfloor', 0x3d, '(\\['}}, {@subj_user={'subj_user', 0x3d, 'vfat\x00'}}, {@seclabel}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@appraise}, {@subj_user={'subj_user', 0x3d, 'vfat\x00'}}, {@euid_eq={'euid', 0x3d, r1}}]}}) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:47:44 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000200)={0xe, 0x17, 0x2, {0x5, './mnt'}}, 0xe) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x10040, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000280)={0x7, 0x21, 0x1}, 0x7) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000000)='mnt/encrypted_dir\x00') 12:47:44 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000840), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}, {&(0x7f0000000080)="08e35745eb9457eaea4aea651d86d32834c545f1ab414d8603347c1efdc3f15002fd4e87bbdc867ad2fd0abfa35eb82721d76861", 0x34, 0x4}], 0x49000, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x101c00, 0x182) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000240)='./mnt\x00', &(0x7f0000000280), &(0x7f0000000300), 0x2, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r2) r3 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x2042, 0x102, 0xb}, 0x18) statx(r0, &(0x7f0000000580)='./mnt\x00', 0x1000, 0x800, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000440)='./file1\x00', &(0x7f0000000480), 0x8000, &(0x7f00000006c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@version_L}, {@version_L}, {@access_client}, {@uname={'uname', 0x3d, '-%:-'}}, {@version_u}, {@access_any}, {@version_u}, {@privport}, {@privport}, {@noextend}], [{@appraise}, {@uid_gt={'uid>', 0xee00}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@dont_measure}, {@euid_gt={'euid>', r4}}, {@fsmagic={'fsmagic', 0x3d, 0x7}}, {@smackfshat={'smackfshat', 0x3d, '\xf1$[@/\')+'}}, {@measure}, {@obj_user}]}}) r5 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) syncfs(r5) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='pagemap\x00') mkdirat(r6, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xb0) syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000000)='./mnt\x00') r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000000, 0x10010, r1, 0x8000000) syz_io_uring_submit(r7, 0x0, &(0x7f0000000380)=@IORING_OP_LINK_TIMEOUT={0xf, 0x1, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x77359400}, 0x1, 0x1}, 0x80f) 12:47:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r0) openat(r0, &(0x7f0000000240)='./mnt/file0\x00', 0x0, 0x81) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./mnt/file0\x00', 0x8082, 0x16b) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) statfs(&(0x7f0000000000)='mnt/encrypted_dir\x00', &(0x7f0000000300)=""/210) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1492.717450] loop3: detected capacity change from 0 to 41948160 [ 1492.723678] loop0: detected capacity change from 0 to 41948160 [ 1492.736826] loop1: detected capacity change from 0 to 41948160 [ 1492.743927] loop7: detected capacity change from 0 to 41948160 [ 1492.750894] loop4: detected capacity change from 0 to 41948160 [ 1492.765109] loop5: detected capacity change from 0 to 41948160 [ 1492.773841] loop2: detected capacity change from 0 to 41948160 12:47:45 executing program 6: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @out_args}, 'mnt/encrypted_dir\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x328ee113}}, 'mnt/encrypted_dir\x00'}) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./mnt\x00', 0x101601, 0x30) sendmsg$AUDIT_GET_FEATURE(r3, &(0x7f0000000480)={0xfffffffffffffffe, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x10, 0x3fb, 0x20, 0x70bd2c, 0x25dfdbff, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x48020}, 0x20000801) sendmsg$AUDIT_GET_FEATURE(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x10, 0x3fb, 0x10, 0x70bd29, 0x25dfdbfb}, 0x10}, 0x1, 0x0, 0x0, 0x1}, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000240)={0xe, 0x17, 0x2, {0x5, './mnt'}}, 0xe) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:47:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', 0x42, 0x1e1) close(r0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000280)=ANY=[@ANYRESOCT=r0]) chdir(&(0x7f0000000040)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0xe0) close(r2) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2}, 'mnt/encrypted_dir\x00'}) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x606d0fc6ee35f05a, 0x1) r4 = syz_open_dev$vcsu(&(0x7f0000000000), 0x7f, 0x4800) r5 = getegid() r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x800000, 0x10, r4, 0x0) r7 = dup2(r0, r3) syz_io_uring_submit(r6, 0x0, &(0x7f0000000300)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x6000, @fd=r7, 0x1, 0x5, 0x6, 0xb, 0x0, {0x2}}, 0x800) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0xee01, r5}}, './mnt\x00'}) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 12:47:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0, {0x4}}, 'mnt/encrypted_dir\x00'}) renameat2(r0, &(0x7f0000000280)='./mnt\x00', r1, &(0x7f0000000340)='./file0\x00', 0x3) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1492.943551] loop2: detected capacity change from 0 to 41948160 [ 1493.535113] loop0: detected capacity change from 0 to 41948160 [ 1493.558343] kauditd_printk_skb: 12 callbacks suppressed [ 1493.558359] audit: type=1400 audit(1750682865.864:116): avc: denied { map } for pid=9135 comm="syz-executor.0" path="/proc/9135/attr/sockcreate" dev="proc" ino=30104 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=file permissive=1 VM DIAGNOSIS: 12:52:50 Registers: info registers vcpu 0 RAX=ffffffff83e93390 RBX=0000000000000000 RCX=ffffffff83e7af2c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e93998 RBP=0000000000000000 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85678908 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e9339e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f2aad08d010 CR3=000000000efba000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=000000000ddd062a EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000418722a5c0000000 XMM03=0000000000441217000000000043a122 XMM04=0000000000439a1900000000004392ae XMM05=000000000043a1220000000000439fea XMM06=0000000000440d180000000000441217 XMM07=00000000004388ee00000000004389d3 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e93390 RBX=0000000000000001 RCX=ffffffff83e7af2c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e93998 RBP=0000000000000001 RSP=ffff888008987e70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85678908 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e9339e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe2c00000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055e29ccdd678 CR3=0000000016e3c000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=63aae01b14a9c0c16a53cdeebe755884 XMM02=203779f1b77a29156826a3a987b81aca XMM03=2177aba69b251fd866bf3deb6fded3f9 XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=0d0c0f0e09080b0a0504070601000302 XMM07=0e0d0c0f0a09080b0605040702010003 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000